Implement support for writing symlinks
The primary goal of this commit is to enable this library to emit zip archives with symlinks while minimizing the surface area of the change to hopefully enable the PR to merge with minimal controversy. Today, it isn't possible to write symlinks with this library because there's no way to preserve the upper S_IFMT bits in the file mode bits because: * There's no way to set FileOptions.permissions with the S_IFLNK bits set (FileOptions.unix_permissions() throws away bits beyond 0o777). * Existing APIs for starting a "typed" (e.g. file or directory) entry automatically set the S_IFMT bits and could conflict with bits set on FileOptions.permissions. * The low-level, generic start_entry() function isn't public. When implementing this, I initially added a `FileOptions.unix_mode()` function to allow setting all 16 bits in the eventual external attributes u32. However, I quickly realized this wouldn't be enough because APIs like start_file() do things like `|= 0o100000`. So if we went this route, we'd need to make consumers of FileOptions.permissions aware of when they should or shouldn't touch the high bits beyond 0o777. I briefly thought about making FileOptions.permissions an enum with a variant to allow the st_mode bits to sail through unmodified. But this change seemed overly invasive, low level, and not very user-friendly. So the approach I decided on was to define a new add_symlink() API. It follows the pattern of add_directory() and provides an easy-to-use and opionated API around the addition of a special file type. I purposefully chose to not implement reading or extraction support for symlinks because a) I don't need the feature at the moment b) implementing symlink extraction in a way that works reliably on all platforms and doesn't have security issues is hard. I figured it was best to limit the scope of this change so this PR stands a good chance of being merged. Partially implements #77.
This commit is contained in:
parent
cf9e347031
commit
46c2ae88d4
1 changed files with 111 additions and 1 deletions
112
src/write.rs
112
src/write.rs
|
@ -174,7 +174,11 @@ impl FileOptions {
|
|||
///
|
||||
/// The format is represented with unix-style permissions.
|
||||
/// The default is `0o644`, which represents `rw-r--r--` for files,
|
||||
/// and `0o755`, which represents `rwxr-xr-x` for directories
|
||||
/// and `0o755`, which represents `rwxr-xr-x` for directories.
|
||||
///
|
||||
/// This method only preserves the file permissions bits (via a `& 0o777`) and discards
|
||||
/// higher file mode bits. So it cannot be used to denote an entry as a directory,
|
||||
/// symlink, or other special file type.
|
||||
#[must_use]
|
||||
pub fn unix_permissions(mut self, mode: u32) -> FileOptions {
|
||||
self.permissions = Some(mode & 0o777);
|
||||
|
@ -747,6 +751,44 @@ impl<W: Write + io::Seek> ZipWriter<W> {
|
|||
Ok(inner.unwrap())
|
||||
}
|
||||
|
||||
/// Add a symlink entry.
|
||||
///
|
||||
/// The zip archive will contain an entry for path `name` which is a symlink to `target`.
|
||||
///
|
||||
/// No validation or normalization of the paths is performed. For best results,
|
||||
/// callers should normalize `\` to `/` and ensure symlinks are relative to other
|
||||
/// paths within the zip archive.
|
||||
///
|
||||
/// WARNING: not all zip implementations preserve symlinks on extract. Some zip
|
||||
/// implementations may materialize a symlink as a regular file, possibly with the
|
||||
/// content incorrectly set to the symlink target. For maximum portability, consider
|
||||
/// storing a regular file instead.
|
||||
pub fn add_symlink<N, T>(
|
||||
&mut self,
|
||||
name: N,
|
||||
target: T,
|
||||
mut options: FileOptions,
|
||||
) -> ZipResult<()>
|
||||
where
|
||||
N: Into<String>,
|
||||
T: Into<String>,
|
||||
{
|
||||
if options.permissions.is_none() {
|
||||
options.permissions = Some(0o777);
|
||||
}
|
||||
*options.permissions.as_mut().unwrap() |= 0o120000;
|
||||
// The symlink target is stored as file content. And compressing the target path
|
||||
// likely wastes space. So always store.
|
||||
options.compression_method = CompressionMethod::Stored;
|
||||
|
||||
self.start_entry(name, options, None)?;
|
||||
self.writing_to_file = true;
|
||||
self.write_all(target.into().as_bytes())?;
|
||||
self.writing_to_file = false;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn finalize(&mut self) -> ZipResult<()> {
|
||||
self.finish_file()?;
|
||||
|
||||
|
@ -1285,6 +1327,13 @@ mod test {
|
|||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn unix_permissions_bitmask() {
|
||||
// unix_permissions() throws away upper bits.
|
||||
let options = FileOptions::default().unix_permissions(0o120777);
|
||||
assert_eq!(options.permissions, Some(0o777));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn write_zip_dir() {
|
||||
let mut writer = ZipWriter::new(io::Cursor::new(Vec::new()));
|
||||
|
@ -1313,6 +1362,67 @@ mod test {
|
|||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn write_symlink_simple() {
|
||||
let mut writer = ZipWriter::new(io::Cursor::new(Vec::new()));
|
||||
writer
|
||||
.add_symlink(
|
||||
"name",
|
||||
"target",
|
||||
FileOptions::default().last_modified_time(
|
||||
DateTime::from_date_and_time(2018, 8, 15, 20, 45, 6).unwrap(),
|
||||
),
|
||||
)
|
||||
.unwrap();
|
||||
assert!(writer
|
||||
.write(b"writing to a symlink is not allowed and will not write any data")
|
||||
.is_err());
|
||||
let result = writer.finish().unwrap();
|
||||
assert_eq!(result.get_ref().len(), 112);
|
||||
assert_eq!(
|
||||
*result.get_ref(),
|
||||
&[
|
||||
80u8, 75, 3, 4, 20, 0, 0, 0, 0, 0, 163, 165, 15, 77, 252, 47, 111, 70, 6, 0, 0, 0,
|
||||
6, 0, 0, 0, 4, 0, 0, 0, 110, 97, 109, 101, 116, 97, 114, 103, 101, 116, 80, 75, 1,
|
||||
2, 46, 3, 20, 0, 0, 0, 0, 0, 163, 165, 15, 77, 252, 47, 111, 70, 6, 0, 0, 0, 6, 0,
|
||||
0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 161, 0, 0, 0, 0, 110, 97, 109, 101,
|
||||
80, 75, 5, 6, 0, 0, 0, 0, 1, 0, 1, 0, 50, 0, 0, 0, 40, 0, 0, 0, 0, 0
|
||||
] as &[u8],
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn write_symlink_wonky_paths() {
|
||||
let mut writer = ZipWriter::new(io::Cursor::new(Vec::new()));
|
||||
writer
|
||||
.add_symlink(
|
||||
"directory\\link",
|
||||
"/absolute/symlink\\with\\mixed/slashes",
|
||||
FileOptions::default().last_modified_time(
|
||||
DateTime::from_date_and_time(2018, 8, 15, 20, 45, 6).unwrap(),
|
||||
),
|
||||
)
|
||||
.unwrap();
|
||||
assert!(writer
|
||||
.write(b"writing to a symlink is not allowed and will not write any data")
|
||||
.is_err());
|
||||
let result = writer.finish().unwrap();
|
||||
assert_eq!(result.get_ref().len(), 162);
|
||||
assert_eq!(
|
||||
*result.get_ref(),
|
||||
&[
|
||||
80u8, 75, 3, 4, 20, 0, 0, 0, 0, 0, 163, 165, 15, 77, 95, 41, 81, 245, 36, 0, 0, 0,
|
||||
36, 0, 0, 0, 14, 0, 0, 0, 100, 105, 114, 101, 99, 116, 111, 114, 121, 92, 108, 105,
|
||||
110, 107, 47, 97, 98, 115, 111, 108, 117, 116, 101, 47, 115, 121, 109, 108, 105,
|
||||
110, 107, 92, 119, 105, 116, 104, 92, 109, 105, 120, 101, 100, 47, 115, 108, 97,
|
||||
115, 104, 101, 115, 80, 75, 1, 2, 46, 3, 20, 0, 0, 0, 0, 0, 163, 165, 15, 77, 95,
|
||||
41, 81, 245, 36, 0, 0, 0, 36, 0, 0, 0, 14, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255,
|
||||
161, 0, 0, 0, 0, 100, 105, 114, 101, 99, 116, 111, 114, 121, 92, 108, 105, 110,
|
||||
107, 80, 75, 5, 6, 0, 0, 0, 0, 1, 0, 1, 0, 60, 0, 0, 0, 80, 0, 0, 0, 0, 0
|
||||
] as &[u8],
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn write_mimetype_zip() {
|
||||
let mut writer = ZipWriter::new(io::Cursor::new(Vec::new()));
|
||||
|
|
Loading…
Add table
Reference in a new issue