X7ROOT File Manager
Current Path:
/opt/alt/ruby27/share/rubygems/rubygems
opt
/
alt
/
ruby27
/
share
/
rubygems
/
rubygems
/
ðŸ“
..
📄
available_set.rb
(3.02 KB)
📄
basic_specification.rb
(7.62 KB)
📄
bundler_version_finder.rb
(2.97 KB)
📄
command.rb
(15.79 KB)
📄
command_manager.rb
(4.99 KB)
ðŸ“
commands
📄
compatibility.rb
(1022 B)
📄
config_file.rb
(12.69 KB)
ðŸ“
core_ext
ðŸ“
defaults
📄
defaults.rb
(4.76 KB)
📄
dependency.rb
(8.64 KB)
📄
dependency_installer.rb
(12 KB)
📄
dependency_list.rb
(5.54 KB)
📄
deprecate.rb
(1.75 KB)
📄
doctor.rb
(3.06 KB)
📄
errors.rb
(4.64 KB)
📄
exceptions.rb
(6.49 KB)
ðŸ“
ext
📄
ext.rb
(460 B)
📄
gem_runner.rb
(2.18 KB)
📄
gemcutter_utilities.rb
(5.16 KB)
📄
indexer.rb
(11.29 KB)
📄
install_default_message.rb
(336 B)
📄
install_message.rb
(310 B)
📄
install_update_options.rb
(6.26 KB)
📄
installer.rb
(26.62 KB)
📄
installer_test_case.rb
(4.8 KB)
📄
local_remote_options.rb
(3.53 KB)
📄
mock_gem_ui.rb
(1.38 KB)
📄
name_tuple.rb
(2.42 KB)
ðŸ“
package
📄
package.rb
(17.99 KB)
📄
package_task.rb
(3.8 KB)
📄
path_support.rb
(1.88 KB)
📄
platform.rb
(6.25 KB)
📄
psych_additions.rb
(300 B)
📄
psych_tree.rb
(796 B)
📄
rdoc.rb
(524 B)
📄
remote_fetcher.rb
(9.48 KB)
ðŸ“
request
📄
request.rb
(8.7 KB)
ðŸ“
request_set
📄
request_set.rb
(11.94 KB)
📄
requirement.rb
(7.15 KB)
ðŸ“
resolver
📄
resolver.rb
(9.46 KB)
📄
s3_uri_signer.rb
(5.93 KB)
📄
safe_yaml.rb
(1.55 KB)
ðŸ“
security
📄
security.rb
(21.24 KB)
📄
security_option.rb
(1.03 KB)
📄
server.rb
(22.72 KB)
ðŸ“
source
📄
source.rb
(5.38 KB)
📄
source_list.rb
(2.55 KB)
📄
source_local.rb
(274 B)
📄
source_specific_file.rb
(272 B)
📄
spec_fetcher.rb
(6.3 KB)
📄
specification.rb
(70.78 KB)
📄
specification_policy.rb
(11.67 KB)
ðŸ“
ssl_certs
📄
stub_specification.rb
(4.74 KB)
📄
syck_hack.rb
(2.12 KB)
📄
test_case.rb
(39.92 KB)
📄
test_utilities.rb
(8.84 KB)
📄
text.rb
(1.85 KB)
📄
uninstaller.rb
(8.83 KB)
📄
uri_formatter.rb
(778 B)
📄
uri_parser.rb
(785 B)
📄
uri_parsing.rb
(324 B)
📄
user_interaction.rb
(13.3 KB)
ðŸ“
util
📄
util.rb
(2.41 KB)
📄
validator.rb
(3.65 KB)
📄
version.rb
(12.45 KB)
📄
version_option.rb
(2.02 KB)
Editing: s3_uri_signer.rb
require 'base64' require 'digest' require 'openssl' ## # S3URISigner implements AWS SigV4 for S3 Source to avoid a dependency on the aws-sdk-* gems # More on AWS SigV4: https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html class Gem::S3URISigner class ConfigurationError < Gem::Exception def initialize(message) super message end def to_s # :nodoc: "#{super}" end end class InstanceProfileError < Gem::Exception def initialize(message) super message end def to_s # :nodoc: "#{super}" end end attr_accessor :uri def initialize(uri) @uri = uri end ## # Signs S3 URI using query-params according to the reference: https://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-query-string-auth.html def sign(expiration = 86400) s3_config = fetch_s3_config current_time = Time.now.utc date_time = current_time.strftime("%Y%m%dT%H%m%SZ") date = date_time[0,8] credential_info = "#{date}/#{s3_config.region}/s3/aws4_request" canonical_host = "#{uri.host}.s3.#{s3_config.region}.amazonaws.com" query_params = generate_canonical_query_params(s3_config, date_time, credential_info, expiration) canonical_request = generate_canonical_request(canonical_host, query_params) string_to_sign = generate_string_to_sign(date_time, credential_info, canonical_request) signature = generate_signature(s3_config, date, string_to_sign) URI.parse("https://#{canonical_host}#{uri.path}?#{query_params}&X-Amz-Signature=#{signature}") end private S3Config = Struct.new :access_key_id, :secret_access_key, :security_token, :region def generate_canonical_query_params(s3_config, date_time, credential_info, expiration) canonical_params = {} canonical_params["X-Amz-Algorithm"] = "AWS4-HMAC-SHA256" canonical_params["X-Amz-Credential"] = "#{s3_config.access_key_id}/#{credential_info}" canonical_params["X-Amz-Date"] = date_time canonical_params["X-Amz-Expires"] = expiration.to_s canonical_params["X-Amz-SignedHeaders"] = "host" canonical_params["X-Amz-Security-Token"] = s3_config.security_token if s3_config.security_token # Sorting is required to generate proper signature canonical_params.sort.to_h.map do |key, value| "#{base64_uri_escape(key)}=#{base64_uri_escape(value)}" end.join("&") end def generate_canonical_request(canonical_host, query_params) [ "GET", uri.path, query_params, "host:#{canonical_host}", "", # empty params "host", "UNSIGNED-PAYLOAD", ].join("\n") end def generate_string_to_sign(date_time, credential_info, canonical_request) [ "AWS4-HMAC-SHA256", date_time, credential_info, Digest::SHA256.hexdigest(canonical_request) ].join("\n") end def generate_signature(s3_config, date, string_to_sign) date_key = OpenSSL::HMAC.digest("sha256", "AWS4" + s3_config.secret_access_key, date) date_region_key = OpenSSL::HMAC.digest("sha256", date_key, s3_config.region) date_region_service_key = OpenSSL::HMAC.digest("sha256", date_region_key, "s3") signing_key = OpenSSL::HMAC.digest("sha256", date_region_service_key, "aws4_request") OpenSSL::HMAC.hexdigest("sha256", signing_key, string_to_sign) end ## # Extracts S3 configuration for S3 bucket def fetch_s3_config return S3Config.new(uri.user, uri.password, nil, "us-east-1") if uri.user && uri.password s3_source = Gem.configuration[:s3_source] || Gem.configuration["s3_source"] host = uri.host raise ConfigurationError.new("no s3_source key exists in .gemrc") unless s3_source auth = s3_source[host] || s3_source[host.to_sym] raise ConfigurationError.new("no key for host #{host} in s3_source in .gemrc") unless auth provider = auth[:provider] || auth["provider"] case provider when "env" id = ENV["AWS_ACCESS_KEY_ID"] secret = ENV["AWS_SECRET_ACCESS_KEY"] security_token = ENV["AWS_SESSION_TOKEN"] when "instance_profile" credentials = ec2_metadata_credentials_json id = credentials["AccessKeyId"] secret = credentials["SecretAccessKey"] security_token = credentials["Token"] else id = auth[:id] || auth["id"] secret = auth[:secret] || auth["secret"] security_token = auth[:security_token] || auth["security_token"] end raise ConfigurationError.new("s3_source for #{host} missing id or secret") unless id && secret region = auth[:region] || auth["region"] || "us-east-1" S3Config.new(id, secret, security_token, region) end def base64_uri_escape(str) str.gsub(/[\+\/=\n]/, BASE64_URI_TRANSLATE) end def ec2_metadata_credentials_json require 'net/http' require 'rubygems/request' require 'rubygems/request/connection_pools' require 'json' iam_info = ec2_metadata_request(EC2_IAM_INFO) # Expected format: arn:aws:iam::<id>:instance-profile/<role_name> role_name = iam_info['InstanceProfileArn'].split('/').last ec2_metadata_request(EC2_IAM_SECURITY_CREDENTIALS + role_name) end def ec2_metadata_request(url) uri = URI(url) @request_pool ||= create_request_pool(uri) request = Gem::Request.new(uri, Net::HTTP::Get, nil, @request_pool) response = request.fetch case response when Net::HTTPOK then JSON.parse(response.body) else raise InstanceProfileError.new("Unable to fetch AWS metadata from #{uri}: #{response.message} #{response.code}") end end def create_request_pool(uri) proxy_uri = Gem::Request.proxy_uri(Gem::Request.get_proxy_from_env(uri.scheme)) certs = Gem::Request.get_cert_files Gem::Request::ConnectionPools.new(proxy_uri, certs).pool_for(uri) end BASE64_URI_TRANSLATE = { "+" => "%2B", "/" => "%2F", "=" => "%3D", "\n" => "" }.freeze EC2_IAM_INFO = "http://169.254.169.254/latest/meta-data/iam/info".freeze EC2_IAM_SECURITY_CREDENTIALS = "http://169.254.169.254/latest/meta-data/iam/security-credentials/".freeze end
Upload File
Create Folder