Add function to extract a all files in an archive to a directory
This commit is contained in:
parent
4e4bbef51b
commit
178699d2d5
2 changed files with 67 additions and 2 deletions
49
src/read.rs
49
src/read.rs
|
@ -6,8 +6,9 @@ use crate::result::{ZipError, ZipResult};
|
||||||
use crate::spec;
|
use crate::spec;
|
||||||
use std::borrow::Cow;
|
use std::borrow::Cow;
|
||||||
use std::collections::HashMap;
|
use std::collections::HashMap;
|
||||||
use std::io;
|
use std::io::{self, prelude::*};
|
||||||
use std::io::prelude::*;
|
use std::fs;
|
||||||
|
use std::path::Path;
|
||||||
|
|
||||||
use crate::cp437::FromCp437;
|
use crate::cp437::FromCp437;
|
||||||
use crate::types::{DateTime, System, ZipFileData};
|
use crate::types::{DateTime, System, ZipFileData};
|
||||||
|
@ -233,6 +234,50 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Extract a Zip archive into a directory.
|
||||||
|
///
|
||||||
|
/// Paths are sanitized so that they cannot escape the given directory.
|
||||||
|
///
|
||||||
|
/// # Platform-specific behaviour
|
||||||
|
///
|
||||||
|
/// On unix systems permissions from the zip file are preserved, if they exist.
|
||||||
|
pub fn extract(&mut self, directory: &Path) -> ZipResult<()> {
|
||||||
|
for i in 0..self.len() {
|
||||||
|
let mut file = self.by_index(i)?;
|
||||||
|
let filepath = file.sanitized_name();
|
||||||
|
|
||||||
|
// `sanitized_name` should return a relative path
|
||||||
|
// otherwise there's a risk of directory traversal attacks
|
||||||
|
assert!(filepath.is_relative());
|
||||||
|
|
||||||
|
let outpath = directory.join(filepath);
|
||||||
|
|
||||||
|
if (&*file.name()).ends_with('/') {
|
||||||
|
fs::create_dir_all(&outpath)?;
|
||||||
|
} else {
|
||||||
|
if let Some(p) = outpath.parent() {
|
||||||
|
if !p.exists() {
|
||||||
|
fs::create_dir_all(&p)?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
let mut outfile = fs::File::create(&outpath)?;
|
||||||
|
io::copy(&mut file, &mut outfile)?;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get and Set permissions
|
||||||
|
#[cfg(unix)]
|
||||||
|
{
|
||||||
|
use std::os::unix::fs::PermissionsExt;
|
||||||
|
|
||||||
|
if let Some(mode) = file.unix_mode() {
|
||||||
|
fs::set_permissions(&outpath, fs::Permissions::from_mode(mode))?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
/// Number of files contained in this zip.
|
/// Number of files contained in this zip.
|
||||||
///
|
///
|
||||||
/// ```
|
/// ```
|
||||||
|
|
20
tests/extract.rs
Normal file
20
tests/extract.rs
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
extern crate zip;
|
||||||
|
|
||||||
|
use std::io;
|
||||||
|
use std::path::PathBuf;
|
||||||
|
use std::fs;
|
||||||
|
|
||||||
|
use zip::ZipArchive;
|
||||||
|
|
||||||
|
// This tests extracting the contents of a zip file
|
||||||
|
#[test]
|
||||||
|
fn extract() {
|
||||||
|
let mut v = Vec::new();
|
||||||
|
v.extend_from_slice(include_bytes!("../tests/data/files_and_dirs.zip"));
|
||||||
|
let mut archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file");
|
||||||
|
|
||||||
|
archive.extract(&PathBuf::from("test_directory")).expect("extract failed");
|
||||||
|
|
||||||
|
// Cleanup
|
||||||
|
fs::remove_dir_all("test_directory").expect("failed to remove extracted files");
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue