def self.prefetch(resources)
apt_keys = instances
resources.each_key do |name|
- if name.length == 40
+ case name.length
+ when 40
provider = apt_keys.find { |key| key.fingerprint == name }
resources[name].provider = provider if provider
- elsif name.length == 16
+ when 16
provider = apt_keys.find { |key| key.long == name }
resources[name].provider = provider if provider
- elsif name.length == 8
+ when 8
provider = apt_keys.find { |key| key.short == name }
resources[name].provider = provider if provider
end
fingerprint = fpr_split.last
return_hash = {
key_fingerprint: fingerprint,
- key_long: fingerprint[-16..-1], # last 16 characters of fingerprint
- key_short: fingerprint[-8..-1], # last 8 characters of fingerprint
+ key_long: fingerprint[-16..], # last 16 characters of fingerprint
+ key_short: fingerprint[-8..], # last 8 characters of fingerprint
key_size: pub_split[2],
key_type: nil,
key_created: Time.at(pub_split[5].to_i),
# Some webservers (e.g. Amazon S3) return code 400 if empty basic auth is sent
if parsed_value.userinfo.nil?
key = if parsed_value.scheme == 'https' && resource[:weak_ssl] == true
- open(parsed_value, ssl_verify_mode: OpenSSL::SSL::VERIFY_NONE).read
+ URI.open(parsed_value, ssl_verify_mode: OpenSSL::SSL::VERIFY_NONE).read
else
parsed_value.read
end
else
user_pass = parsed_value.userinfo.split(':')
parsed_value.userinfo = ''
- key = open(parsed_value, http_basic_authentication: user_pass).read
+ key = URI.open(parsed_value, http_basic_authentication: user_pass).read
end
rescue *exceptions => e
raise(_('%{_e} for %{_resource}') % { _e: e.message, _resource: resource[:source] })