2007-11-10 02:48:56 -05:00
|
|
|
require 'net/http'
|
2008-06-17 18:04:18 -04:00
|
|
|
require 'stringio'
|
2008-06-25 22:06:00 -04:00
|
|
|
require 'time'
|
2007-11-10 02:48:56 -05:00
|
|
|
require 'uri'
|
|
|
|
|
|
|
|
require 'rubygems'
|
|
|
|
|
|
|
|
##
|
|
|
|
# RemoteFetcher handles the details of fetching gems and gem information from
|
|
|
|
# a remote source.
|
|
|
|
|
|
|
|
class Gem::RemoteFetcher
|
|
|
|
|
2008-03-31 18:40:06 -04:00
|
|
|
include Gem::UserInteraction
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
|
|
|
# A FetchError exception wraps up the various possible IO and HTTP failures
|
|
|
|
# that could happen while downloading from the internet.
|
|
|
|
|
|
|
|
class FetchError < Gem::Exception
|
|
|
|
|
|
|
|
##
|
|
|
|
# The URI which was being accessed when the exception happened.
|
|
|
|
|
|
|
|
attr_accessor :uri
|
|
|
|
|
|
|
|
def initialize(message, uri)
|
|
|
|
super message
|
|
|
|
@uri = uri
|
|
|
|
end
|
|
|
|
|
|
|
|
def to_s # :nodoc:
|
|
|
|
"#{super} (#{uri})"
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
2007-11-10 02:48:56 -05:00
|
|
|
|
|
|
|
@fetcher = nil
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Cached RemoteFetcher instance.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2007-11-10 02:48:56 -05:00
|
|
|
def self.fetcher
|
2007-12-20 03:39:12 -05:00
|
|
|
@fetcher ||= self.new Gem.configuration[:http_proxy]
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Initialize a remote fetcher using the source URI and possible proxy
|
|
|
|
# information.
|
|
|
|
#
|
|
|
|
# +proxy+
|
|
|
|
# * [String]: explicit specification of proxy; overrides any environment
|
|
|
|
# variable setting
|
|
|
|
# * nil: respect environment variables (HTTP_PROXY, HTTP_PROXY_USER,
|
|
|
|
# HTTP_PROXY_PASS)
|
|
|
|
# * <tt>:no_proxy</tt>: ignore environment variables and _don't_ use a proxy
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2009-06-09 17:38:59 -04:00
|
|
|
def initialize(proxy = nil)
|
2008-03-31 18:40:06 -04:00
|
|
|
Socket.do_not_reverse_lookup = true
|
|
|
|
|
|
|
|
@connections = {}
|
|
|
|
@requests = Hash.new 0
|
2007-11-10 02:48:56 -05:00
|
|
|
@proxy_uri =
|
|
|
|
case proxy
|
|
|
|
when :no_proxy then nil
|
|
|
|
when nil then get_proxy_from_env
|
|
|
|
when URI::HTTP then proxy
|
|
|
|
else URI.parse(proxy)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2008-03-31 18:40:06 -04:00
|
|
|
##
|
|
|
|
# Moves the gem +spec+ from +source_uri+ to the cache dir unless it is
|
|
|
|
# already there. If the source_uri is local the gem cache dir copy is
|
|
|
|
# always replaced.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2008-03-31 18:40:06 -04:00
|
|
|
def download(spec, source_uri, install_dir = Gem.dir)
|
2008-06-25 22:06:00 -04:00
|
|
|
if File.writable?(install_dir)
|
|
|
|
cache_dir = File.join install_dir, 'cache'
|
|
|
|
else
|
2008-09-25 06:13:50 -04:00
|
|
|
cache_dir = File.join(Gem.user_dir, 'cache')
|
2008-06-25 22:06:00 -04:00
|
|
|
end
|
|
|
|
|
2010-02-21 21:52:35 -05:00
|
|
|
gem_file_name = spec.file_name
|
2008-06-17 18:04:18 -04:00
|
|
|
local_gem_path = File.join cache_dir, gem_file_name
|
2008-03-31 18:40:06 -04:00
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
FileUtils.mkdir_p cache_dir rescue nil unless File.exist? cache_dir
|
2008-03-31 18:40:06 -04:00
|
|
|
|
2009-06-09 17:38:59 -04:00
|
|
|
# Always escape URI's to deal with potential spaces and such
|
|
|
|
unless URI::Generic === source_uri
|
2010-04-22 04:24:42 -04:00
|
|
|
source_uri = URI.parse(URI.const_defined?(:DEFAULT_PARSER) ?
|
|
|
|
URI::DEFAULT_PARSER.escape(source_uri) :
|
|
|
|
URI.escape(source_uri))
|
2009-06-09 17:38:59 -04:00
|
|
|
end
|
|
|
|
|
2008-03-31 18:40:06 -04:00
|
|
|
scheme = source_uri.scheme
|
|
|
|
|
|
|
|
# URI.parse gets confused by MS Windows paths with forward slashes.
|
|
|
|
scheme = nil if scheme =~ /^[a-z]$/i
|
|
|
|
|
|
|
|
case scheme
|
2008-09-25 06:13:50 -04:00
|
|
|
when 'http', 'https' then
|
2008-03-31 18:40:06 -04:00
|
|
|
unless File.exist? local_gem_path then
|
|
|
|
begin
|
|
|
|
say "Downloading gem #{gem_file_name}" if
|
|
|
|
Gem.configuration.really_verbose
|
|
|
|
|
|
|
|
remote_gem_path = source_uri + "gems/#{gem_file_name}"
|
|
|
|
|
2009-06-09 17:38:59 -04:00
|
|
|
gem = self.fetch_path remote_gem_path
|
2008-03-31 18:40:06 -04:00
|
|
|
rescue Gem::RemoteFetcher::FetchError
|
|
|
|
raise if spec.original_platform == spec.platform
|
|
|
|
|
|
|
|
alternate_name = "#{spec.original_name}.gem"
|
|
|
|
|
|
|
|
say "Failed, downloading gem #{alternate_name}" if
|
|
|
|
Gem.configuration.really_verbose
|
|
|
|
|
|
|
|
remote_gem_path = source_uri + "gems/#{alternate_name}"
|
|
|
|
|
2009-06-09 17:38:59 -04:00
|
|
|
gem = self.fetch_path remote_gem_path
|
2008-03-31 18:40:06 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
File.open local_gem_path, 'wb' do |fp|
|
|
|
|
fp.write gem
|
|
|
|
end
|
|
|
|
end
|
2009-06-09 17:38:59 -04:00
|
|
|
when 'file' then
|
|
|
|
begin
|
|
|
|
path = source_uri.path
|
|
|
|
path = File.dirname(path) if File.extname(path) == '.gem'
|
|
|
|
|
|
|
|
remote_gem_path = File.join(path, 'gems', gem_file_name)
|
|
|
|
|
|
|
|
FileUtils.cp(remote_gem_path, local_gem_path)
|
|
|
|
rescue Errno::EACCES
|
|
|
|
local_gem_path = source_uri.to_s
|
|
|
|
end
|
|
|
|
|
|
|
|
say "Using local gem #{local_gem_path}" if
|
|
|
|
Gem.configuration.really_verbose
|
|
|
|
when nil then # TODO test for local overriding cache
|
2010-02-21 21:52:35 -05:00
|
|
|
source_path = if Gem.win_platform? && source_uri.scheme &&
|
|
|
|
!source_uri.path.include?(':') then
|
|
|
|
"#{source_uri.scheme}:#{source_uri.path}"
|
|
|
|
else
|
|
|
|
source_uri.path
|
|
|
|
end
|
|
|
|
|
|
|
|
source_path = URI.unescape source_path
|
|
|
|
|
2008-03-31 18:40:06 -04:00
|
|
|
begin
|
2010-02-21 21:52:35 -05:00
|
|
|
FileUtils.cp source_path, local_gem_path unless
|
|
|
|
File.expand_path(source_path) == File.expand_path(local_gem_path)
|
2008-03-31 18:40:06 -04:00
|
|
|
rescue Errno::EACCES
|
|
|
|
local_gem_path = source_uri.to_s
|
|
|
|
end
|
|
|
|
|
|
|
|
say "Using local gem #{local_gem_path}" if
|
|
|
|
Gem.configuration.really_verbose
|
|
|
|
else
|
|
|
|
raise Gem::InstallError, "unsupported URI scheme #{source_uri.scheme}"
|
|
|
|
end
|
|
|
|
|
|
|
|
local_gem_path
|
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
|
|
|
# Downloads +uri+ and returns it as a String.
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
def fetch_path(uri, mtime = nil, head = false)
|
2008-09-25 06:13:50 -04:00
|
|
|
data = open_uri_or_path uri, mtime, head
|
|
|
|
data = Gem.gunzip data if data and not head and uri.to_s =~ /gz$/
|
2008-06-25 22:06:00 -04:00
|
|
|
data
|
2008-06-17 18:04:18 -04:00
|
|
|
rescue FetchError
|
|
|
|
raise
|
2007-11-10 02:48:56 -05:00
|
|
|
rescue Timeout::Error
|
2008-06-17 18:04:18 -04:00
|
|
|
raise FetchError.new('timed out', uri)
|
2007-12-20 03:39:12 -05:00
|
|
|
rescue IOError, SocketError, SystemCallError => e
|
2008-06-17 18:04:18 -04:00
|
|
|
raise FetchError.new("#{e.class}: #{e}", uri)
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Returns the size of +uri+ in bytes.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
def fetch_size(uri) # TODO: phase this out
|
|
|
|
response = fetch_path(uri, nil, true)
|
2007-11-10 02:48:56 -05:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
response['content-length'].to_i
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def escape(str)
|
|
|
|
return unless str
|
|
|
|
URI.escape(str)
|
|
|
|
end
|
|
|
|
|
|
|
|
def unescape(str)
|
|
|
|
return unless str
|
|
|
|
URI.unescape(str)
|
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Returns an HTTP proxy URI if one is set in the environment variables.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2007-11-10 02:48:56 -05:00
|
|
|
def get_proxy_from_env
|
|
|
|
env_proxy = ENV['http_proxy'] || ENV['HTTP_PROXY']
|
|
|
|
|
|
|
|
return nil if env_proxy.nil? or env_proxy.empty?
|
|
|
|
|
2009-06-09 17:38:59 -04:00
|
|
|
uri = URI.parse(normalize_uri(env_proxy))
|
2007-11-10 02:48:56 -05:00
|
|
|
|
|
|
|
if uri and uri.user.nil? and uri.password.nil? then
|
|
|
|
# Probably we have http_proxy_* variables?
|
|
|
|
uri.user = escape(ENV['http_proxy_user'] || ENV['HTTP_PROXY_USER'])
|
|
|
|
uri.password = escape(ENV['http_proxy_pass'] || ENV['HTTP_PROXY_PASS'])
|
|
|
|
end
|
|
|
|
|
|
|
|
uri
|
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Normalize the URI by adding "http://" if it is missing.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2007-11-10 02:48:56 -05:00
|
|
|
def normalize_uri(uri)
|
|
|
|
(uri =~ /^(https?|ftp|file):/) ? uri : "http://#{uri}"
|
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
|
|
|
# Creates or an HTTP connection based on +uri+, or retrieves an existing
|
|
|
|
# connection, using a proxy if needed.
|
|
|
|
|
|
|
|
def connection_for(uri)
|
|
|
|
net_http_args = [uri.host, uri.port]
|
|
|
|
|
|
|
|
if @proxy_uri then
|
|
|
|
net_http_args += [
|
|
|
|
@proxy_uri.host,
|
|
|
|
@proxy_uri.port,
|
|
|
|
@proxy_uri.user,
|
|
|
|
@proxy_uri.password
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
connection_id = net_http_args.join ':'
|
|
|
|
@connections[connection_id] ||= Net::HTTP.new(*net_http_args)
|
|
|
|
connection = @connections[connection_id]
|
|
|
|
|
|
|
|
if uri.scheme == 'https' and not connection.started? then
|
2008-09-25 06:13:50 -04:00
|
|
|
require 'net/https'
|
|
|
|
connection.use_ssl = true
|
|
|
|
connection.verify_mode = OpenSSL::SSL::VERIFY_NONE
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
2008-06-17 18:04:18 -04:00
|
|
|
|
|
|
|
connection.start unless connection.started?
|
|
|
|
|
|
|
|
connection
|
2010-04-22 04:24:42 -04:00
|
|
|
rescue Errno::EHOSTDOWN => e
|
|
|
|
raise FetchError.new(e.message, uri)
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
2007-11-10 02:48:56 -05:00
|
|
|
# Read the data from the (source based) URI, but if it is a file:// URI,
|
|
|
|
# read from the filesystem instead.
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
def open_uri_or_path(uri, last_modified = nil, head = false, depth = 0)
|
|
|
|
raise "block is dead" if block_given?
|
2007-11-10 02:48:56 -05:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
uri = URI.parse uri unless URI::Generic === uri
|
2009-06-09 17:38:59 -04:00
|
|
|
|
|
|
|
# This check is redundant unless Gem::RemoteFetcher is likely
|
|
|
|
# to be used directly, since the scheme is checked elsewhere.
|
|
|
|
# - Daniel Berger
|
|
|
|
unless ['http', 'https', 'file'].include?(uri.scheme)
|
|
|
|
raise ArgumentError, 'uri scheme is invalid'
|
|
|
|
end
|
|
|
|
|
|
|
|
if uri.scheme == 'file'
|
|
|
|
path = uri.path
|
|
|
|
|
|
|
|
# Deal with leading slash on Windows paths
|
|
|
|
if path[0].chr == '/' && path[1].chr =~ /[a-zA-Z]/ && path[2].chr == ':'
|
|
|
|
path = path[1..-1]
|
|
|
|
end
|
|
|
|
|
|
|
|
return Gem.read_binary(path)
|
|
|
|
end
|
2008-06-17 18:04:18 -04:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
fetch_type = head ? Net::HTTP::Head : Net::HTTP::Get
|
|
|
|
response = request uri, fetch_type, last_modified
|
|
|
|
|
|
|
|
case response
|
2008-09-25 06:13:50 -04:00
|
|
|
when Net::HTTPOK, Net::HTTPNotModified then
|
2008-06-25 22:06:00 -04:00
|
|
|
head ? response : response.body
|
2008-09-25 06:13:50 -04:00
|
|
|
when Net::HTTPMovedPermanently, Net::HTTPFound, Net::HTTPSeeOther,
|
|
|
|
Net::HTTPTemporaryRedirect then
|
2008-06-25 22:06:00 -04:00
|
|
|
raise FetchError.new('too many redirects', uri) if depth > 10
|
|
|
|
|
|
|
|
open_uri_or_path(response['Location'], last_modified, head, depth + 1)
|
|
|
|
else
|
|
|
|
raise FetchError.new("bad response #{response.message} #{response.code}", uri)
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
##
|
|
|
|
# Performs a Net::HTTP request of type +request_class+ on +uri+ returning
|
|
|
|
# a Net::HTTP response object. request maintains a table of persistent
|
|
|
|
# connections to reduce connect overhead.
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
def request(uri, request_class, last_modified = nil)
|
2008-06-17 18:04:18 -04:00
|
|
|
request = request_class.new uri.request_uri
|
|
|
|
|
|
|
|
unless uri.nil? || uri.user.nil? || uri.user.empty? then
|
|
|
|
request.basic_auth uri.user, uri.password
|
|
|
|
end
|
|
|
|
|
2010-04-22 04:24:42 -04:00
|
|
|
ua = "RubyGems/#{Gem::VERSION} #{Gem::Platform.local}"
|
2008-06-17 18:04:18 -04:00
|
|
|
ua << " Ruby/#{RUBY_VERSION} (#{RUBY_RELEASE_DATE}"
|
|
|
|
ua << " patchlevel #{RUBY_PATCHLEVEL}" if defined? RUBY_PATCHLEVEL
|
|
|
|
ua << ")"
|
|
|
|
|
|
|
|
request.add_field 'User-Agent', ua
|
|
|
|
request.add_field 'Connection', 'keep-alive'
|
|
|
|
request.add_field 'Keep-Alive', '30'
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
if last_modified then
|
2008-09-25 06:13:50 -04:00
|
|
|
last_modified = last_modified.utc
|
2008-06-25 22:06:00 -04:00
|
|
|
request.add_field 'If-Modified-Since', last_modified.rfc2822
|
|
|
|
end
|
|
|
|
|
2010-02-21 21:52:35 -05:00
|
|
|
yield request if block_given?
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
connection = connection_for uri
|
|
|
|
|
|
|
|
retried = false
|
2008-06-25 22:06:00 -04:00
|
|
|
bad_response = false
|
2008-06-17 18:04:18 -04:00
|
|
|
|
|
|
|
begin
|
|
|
|
@requests[connection.object_id] += 1
|
2010-02-21 21:52:35 -05:00
|
|
|
|
|
|
|
say "#{request.method} #{uri}" if
|
|
|
|
Gem.configuration.really_verbose
|
2008-06-17 18:04:18 -04:00
|
|
|
response = connection.request request
|
2010-02-21 21:52:35 -05:00
|
|
|
say "#{response.code} #{response.message}" if
|
2008-06-17 18:04:18 -04:00
|
|
|
Gem.configuration.really_verbose
|
2010-02-21 21:52:35 -05:00
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
rescue Net::HTTPBadResponse
|
2010-02-21 21:52:35 -05:00
|
|
|
say "bad response" if Gem.configuration.really_verbose
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
reset connection
|
|
|
|
|
|
|
|
raise FetchError.new('too many bad responses', uri) if bad_response
|
|
|
|
|
|
|
|
bad_response = true
|
|
|
|
retry
|
2008-09-25 06:13:50 -04:00
|
|
|
# HACK work around EOFError bug in Net::HTTP
|
|
|
|
# NOTE Errno::ECONNABORTED raised a lot on Windows, and make impossible
|
|
|
|
# to install gems.
|
2010-04-22 04:24:42 -04:00
|
|
|
rescue EOFError, Timeout::Error,
|
|
|
|
Errno::ECONNABORTED, Errno::ECONNRESET, Errno::EPIPE
|
|
|
|
|
2008-06-17 18:04:18 -04:00
|
|
|
requests = @requests[connection.object_id]
|
|
|
|
say "connection reset after #{requests} requests, retrying" if
|
|
|
|
Gem.configuration.really_verbose
|
|
|
|
|
|
|
|
raise FetchError.new('too many connection resets', uri) if retried
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
reset connection
|
2008-06-17 18:04:18 -04:00
|
|
|
|
|
|
|
retried = true
|
|
|
|
retry
|
|
|
|
end
|
|
|
|
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
2008-06-25 22:06:00 -04:00
|
|
|
##
|
|
|
|
# Resets HTTP connection +connection+.
|
|
|
|
|
|
|
|
def reset(connection)
|
|
|
|
@requests.delete connection.object_id
|
|
|
|
|
|
|
|
connection.finish
|
|
|
|
connection.start
|
|
|
|
end
|
|
|
|
|
2007-11-10 02:48:56 -05:00
|
|
|
end
|
|
|
|
|