refactor: remove extra variants from ZipError

This commit is contained in:
Marli Frost 2020-09-10 09:57:00 +01:00
parent 63a3e89ef8
commit 5e5bd86915
No known key found for this signature in database
GPG key ID: CB0BEA7CF9BD1245
3 changed files with 46 additions and 31 deletions

View file

@ -2,7 +2,7 @@
use crate::compression::CompressionMethod; use crate::compression::CompressionMethod;
use crate::crc32::Crc32Reader; use crate::crc32::Crc32Reader;
use crate::result::{ZipError, ZipResult}; use crate::result::{InvalidPassword, ZipError, ZipResult};
use crate::spec; use crate::spec;
use crate::zipcrypto::ZipCryptoReader; use crate::zipcrypto::ZipCryptoReader;
use crate::zipcrypto::ZipCryptoReaderValid; use crate::zipcrypto::ZipCryptoReaderValid;
@ -137,17 +137,17 @@ fn make_reader<'a>(
crc32: u32, crc32: u32,
reader: io::Take<&'a mut dyn io::Read>, reader: io::Take<&'a mut dyn io::Read>,
password: Option<&[u8]>, password: Option<&[u8]>,
) -> ZipResult<ZipFileReader<'a>> { ) -> ZipResult<Result<ZipFileReader<'a>, InvalidPassword>> {
let reader = match password { let reader = match password {
None => CryptoReader::Plaintext(reader), None => CryptoReader::Plaintext(reader),
Some(password) => match ZipCryptoReader::new(reader, password).validate(crc32)? { Some(password) => match ZipCryptoReader::new(reader, password).validate(crc32)? {
None => return Err(ZipError::InvalidPassword), None => return Ok(Err(InvalidPassword)),
Some(r) => CryptoReader::ZipCrypto(r), Some(r) => CryptoReader::ZipCrypto(r),
}, },
}; };
match compression_method { match compression_method {
CompressionMethod::Stored => Ok(ZipFileReader::Stored(Crc32Reader::new(reader, crc32))), CompressionMethod::Stored => Ok(Ok(ZipFileReader::Stored(Crc32Reader::new(reader, crc32)))),
#[cfg(any( #[cfg(any(
feature = "deflate", feature = "deflate",
feature = "deflate-miniz", feature = "deflate-miniz",
@ -155,15 +155,18 @@ fn make_reader<'a>(
))] ))]
CompressionMethod::Deflated => { CompressionMethod::Deflated => {
let deflate_reader = DeflateDecoder::new(reader); let deflate_reader = DeflateDecoder::new(reader);
Ok(ZipFileReader::Deflated(Crc32Reader::new( Ok(Ok(ZipFileReader::Deflated(Crc32Reader::new(
deflate_reader, deflate_reader,
crc32, crc32,
))) ))))
} }
#[cfg(feature = "bzip2")] #[cfg(feature = "bzip2")]
CompressionMethod::Bzip2 => { CompressionMethod::Bzip2 => {
let bzip2_reader = BzDecoder::new(reader); let bzip2_reader = BzDecoder::new(reader);
Ok(ZipFileReader::Bzip2(Crc32Reader::new(bzip2_reader, crc32))) Ok(Ok(ZipFileReader::Bzip2(Crc32Reader::new(
bzip2_reader,
crc32,
))))
} }
_ => unsupported_zip_error("Compression method not supported"), _ => unsupported_zip_error("Compression method not supported"),
} }
@ -341,20 +344,20 @@ impl<R: Read + io::Seek> ZipArchive<R> {
&'a mut self, &'a mut self,
name: &str, name: &str,
password: &[u8], password: &[u8],
) -> ZipResult<ZipFile<'a>> { ) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
self.by_name_with_optional_password(name, Some(password)) self.by_name_with_optional_password(name, Some(password))
} }
/// Search for a file entry by name /// Search for a file entry by name
pub fn by_name<'a>(&'a mut self, name: &str) -> ZipResult<ZipFile<'a>> { pub fn by_name<'a>(&'a mut self, name: &str) -> ZipResult<ZipFile<'a>> {
self.by_name_with_optional_password(name, None) Ok(self.by_name_with_optional_password(name, None)?.unwrap())
} }
fn by_name_with_optional_password<'a>( fn by_name_with_optional_password<'a>(
&'a mut self, &'a mut self,
name: &str, name: &str,
password: Option<&[u8]>, password: Option<&[u8]>,
) -> ZipResult<ZipFile<'a>> { ) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
let index = match self.names_map.get(name) { let index = match self.names_map.get(name) {
Some(index) => *index, Some(index) => *index,
None => { None => {
@ -369,27 +372,33 @@ impl<R: Read + io::Seek> ZipArchive<R> {
&'a mut self, &'a mut self,
file_number: usize, file_number: usize,
password: &[u8], password: &[u8],
) -> ZipResult<ZipFile<'a>> { ) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
self.by_index_with_optional_password(file_number, Some(password)) self.by_index_with_optional_password(file_number, Some(password))
} }
/// Get a contained file by index /// Get a contained file by index
pub fn by_index<'a>(&'a mut self, file_number: usize) -> ZipResult<ZipFile<'a>> { pub fn by_index<'a>(&'a mut self, file_number: usize) -> ZipResult<ZipFile<'a>> {
self.by_index_with_optional_password(file_number, None) Ok(self
.by_index_with_optional_password(file_number, None)?
.unwrap())
} }
fn by_index_with_optional_password<'a>( fn by_index_with_optional_password<'a>(
&'a mut self, &'a mut self,
file_number: usize, file_number: usize,
mut password: Option<&[u8]>, mut password: Option<&[u8]>,
) -> ZipResult<ZipFile<'a>> { ) -> ZipResult<Result<ZipFile<'a>, InvalidPassword>> {
if file_number >= self.files.len() { if file_number >= self.files.len() {
return Err(ZipError::FileNotFound); return Err(ZipError::FileNotFound);
} }
let data = &mut self.files[file_number]; let data = &mut self.files[file_number];
match (password, data.encrypted) { match (password, data.encrypted) {
(None, true) => return Err(ZipError::PasswordRequired), (None, true) => {
return Err(ZipError::UnsupportedArchive(
"Password required to decrypt file",
))
}
(Some(_), false) => password = None, //Password supplied, but none needed! Discard. (Some(_), false) => password = None, //Password supplied, but none needed! Discard.
_ => {} _ => {}
} }
@ -411,10 +420,14 @@ impl<R: Read + io::Seek> ZipArchive<R> {
self.reader.seek(io::SeekFrom::Start(data.data_start))?; self.reader.seek(io::SeekFrom::Start(data.data_start))?;
let limit_reader = (self.reader.by_ref() as &mut dyn Read).take(data.compressed_size); let limit_reader = (self.reader.by_ref() as &mut dyn Read).take(data.compressed_size);
Ok(ZipFile { match make_reader(data.compression_method, data.crc32, limit_reader, password) {
reader: make_reader(data.compression_method, data.crc32, limit_reader, password)?, Ok(Ok(reader)) => Ok(Ok(ZipFile {
data: Cow::Borrowed(data), reader,
}) data: Cow::Borrowed(data),
})),
Err(e) => Err(e),
Ok(Err(e)) => Ok(Err(e)),
}
} }
/// Unwrap and return the inner reader object /// Unwrap and return the inner reader object
@ -771,7 +784,7 @@ pub fn read_zipfile_from_stream<'a, R: io::Read>(
let result_compression_method = result.compression_method; let result_compression_method = result.compression_method;
Ok(Some(ZipFile { Ok(Some(ZipFile {
data: Cow::Owned(result), data: Cow::Owned(result),
reader: make_reader(result_compression_method, result_crc32, limit_reader, None)?, reader: make_reader(result_compression_method, result_crc32, limit_reader, None)?.unwrap(),
})) }))
} }

View file

@ -7,6 +7,11 @@ use thiserror::Error;
/// Generic result type with ZipError as its error variant /// Generic result type with ZipError as its error variant
pub type ZipResult<T> = Result<T, ZipError>; pub type ZipResult<T> = Result<T, ZipError>;
/// The given password is wrong
#[derive(Error, Debug)]
#[error("invalid password for file in archive")]
pub struct InvalidPassword;
/// Error type for Zip /// Error type for Zip
#[derive(Debug, Error)] #[derive(Debug, Error)]
pub enum ZipError { pub enum ZipError {
@ -25,14 +30,6 @@ pub enum ZipError {
/// The requested file could not be found in the archive /// The requested file could not be found in the archive
#[error("specified file not found in archive")] #[error("specified file not found in archive")]
FileNotFound, FileNotFound,
/// No password was given but the data is encrypted
#[error("missing password, file in archive is encrypted")]
PasswordRequired,
/// The given password is wrong
#[error("invalid password for file in archive")]
InvalidPassword,
} }
impl From<ZipError> for io::Error { impl From<ZipError> for io::Error {

View file

@ -47,7 +47,9 @@ fn encrypted_file() {
// No password // No password
let file = archive.by_index(0); let file = archive.by_index(0);
match file { match file {
Err(zip::result::ZipError::PasswordRequired) => (), Err(zip::result::ZipError::UnsupportedArchive("Password required to decrypt file")) => {
()
}
Err(_) => panic!( Err(_) => panic!(
"Expected PasswordRequired error when opening encrypted file without password" "Expected PasswordRequired error when opening encrypted file without password"
), ),
@ -59,17 +61,20 @@ fn encrypted_file() {
// Wrong password // Wrong password
let file = archive.by_index_decrypt(0, b"wrong password"); let file = archive.by_index_decrypt(0, b"wrong password");
match file { match file {
Err(zip::result::ZipError::InvalidPassword) => (), Ok(Err(zip::result::InvalidPassword)) => (),
Err(_) => panic!( Err(_) => panic!(
"Expected InvalidPassword error when opening encrypted file with wrong password" "Expected InvalidPassword error when opening encrypted file with wrong password"
), ),
Ok(_) => panic!("Error: Successfully opened encrypted file with wrong password?!"), Ok(Ok(_)) => panic!("Error: Successfully opened encrypted file with wrong password?!"),
} }
} }
{ {
// Correct password, read contents // Correct password, read contents
let mut file = archive.by_index_decrypt(0, "test".as_bytes()).unwrap(); let mut file = archive
.by_index_decrypt(0, "test".as_bytes())
.unwrap()
.unwrap();
#[allow(deprecated)] #[allow(deprecated)]
let file_name = file.sanitized_name(); let file_name = file.sanitized_name();
assert_eq!(file_name, std::path::PathBuf::from("test.txt")); assert_eq!(file_name, std::path::PathBuf::from("test.txt"));