From 1aa3710aff48081cb1b1d6512fff0aa27a3187f0 Mon Sep 17 00:00:00 2001 From: Kyle Bloom Date: Thu, 2 Feb 2023 08:56:19 +0000 Subject: [PATCH 01/14] Remove redundant tests --- src/types.rs | 21 --------------------- 1 file changed, 21 deletions(-) diff --git a/src/types.rs b/src/types.rs index c333d8fa..c3d0a45d 100644 --- a/src/types.rs +++ b/src/types.rs @@ -555,27 +555,6 @@ mod test { #[cfg(feature = "time")] use time::{format_description::well_known::Rfc3339, OffsetDateTime}; - #[cfg(feature = "time")] - #[test] - fn datetime_from_time_bounds() { - use std::convert::TryFrom; - - use super::DateTime; - use time::macros::datetime; - - // 1979-12-31 23:59:59 - assert!(DateTime::try_from(datetime!(1979-12-31 23:59:59 UTC)).is_err()); - - // 1980-01-01 00:00:00 - assert!(DateTime::try_from(datetime!(1980-01-01 00:00:00 UTC)).is_ok()); - - // 2107-12-31 23:59:59 - assert!(DateTime::try_from(datetime!(2107-12-31 23:59:59 UTC)).is_ok()); - - // 2108-01-01 00:00:00 - assert!(DateTime::try_from(datetime!(2108-01-01 00:00:00 UTC)).is_err()); - } - #[cfg(feature = "time")] #[test] fn datetime_try_from_bounds() { From 7d00bbea90d3d7dd72663765e40c926f7327b5f7 Mon Sep 17 00:00:00 2001 From: Jim Turner Date: Tue, 28 Mar 2023 21:57:44 -0400 Subject: [PATCH 02/14] Add rust-version field to Cargo.toml This causes compilers older than the MSRV to produce a warning/error which more clearly indicates that the crate needs a newer compiler. See https://doc.rust-lang.org/cargo/reference/manifest.html#the-rust-version-field --- Cargo.toml | 1 + 1 file changed, 1 insertion(+) diff --git a/Cargo.toml b/Cargo.toml index 5468919a..17113391 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -9,6 +9,7 @@ description = """ Library to support the reading and writing of zip files. """ edition = "2021" +rust-version = "1.59.0" [dependencies] aes = { version = "0.7.5", optional = true } From 2eeb47ce56855859fd265eecb61d76305492d362 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 6 May 2023 15:48:52 +0100 Subject: [PATCH 03/14] add support for writing files with PKWARE encryption --- src/unstable.rs | 16 +++++++++++ src/write.rs | 65 ++++++++++++++++++++++++++++++++++++--------- src/zipcrypto.rs | 46 +++++++++++++++++++++++++------- tests/zip_crypto.rs | 17 ++++++++++++ 4 files changed, 121 insertions(+), 23 deletions(-) diff --git a/src/unstable.rs b/src/unstable.rs index 2cbfa5bb..f8b46a97 100644 --- a/src/unstable.rs +++ b/src/unstable.rs @@ -2,3 +2,19 @@ pub mod stream { pub use crate::read::stream::*; } +/// Types for creating ZIP archives. +pub mod write { + use crate::write::FileOptions; + /// Unstable methods for [`FileOptions`]. + pub trait FileOptionsExt { + /// Write the file with the given password using the deprecated ZipCrypto algorithm. + /// + /// This is not recommended for new archives, as ZipCrypto is not secure. + fn with_deprecated_encryption(self, password: &[u8]) -> Self; + } + impl FileOptionsExt for FileOptions { + fn with_deprecated_encryption(self, password: &[u8]) -> Self { + self.with_deprecated_encryption(password) + } + } +} \ No newline at end of file diff --git a/src/write.rs b/src/write.rs index 3f41c4d6..4cdc031b 100644 --- a/src/write.rs +++ b/src/write.rs @@ -29,19 +29,37 @@ use time::OffsetDateTime; #[cfg(feature = "zstd")] use zstd::stream::write::Encoder as ZstdEncoder; +enum MaybeEncrypted { + Unencrypted(W), + Encrypted(crate::zipcrypto::ZipCryptoWriter), +} +impl Write for MaybeEncrypted { + fn write(&mut self, buf: &[u8]) -> io::Result { + match self { + MaybeEncrypted::Unencrypted(w) => w.write(buf), + MaybeEncrypted::Encrypted(w) => w.write(buf), + } + } + fn flush(&mut self) -> io::Result<()> { + match self { + MaybeEncrypted::Unencrypted(w) => w.flush(), + MaybeEncrypted::Encrypted(w) => w.flush(), + } + } +} enum GenericZipWriter { Closed, - Storer(W), + Storer(MaybeEncrypted), #[cfg(any( feature = "deflate", feature = "deflate-miniz", feature = "deflate-zlib" ))] - Deflater(DeflateEncoder), + Deflater(DeflateEncoder>), #[cfg(feature = "bzip2")] - Bzip2(BzEncoder), + Bzip2(BzEncoder>), #[cfg(feature = "zstd")] - Zstd(ZstdEncoder<'static, W>), + Zstd(ZstdEncoder<'static, MaybeEncrypted>), } // Put the struct declaration in a private module to convince rustdoc to display ZipWriter nicely pub(crate) mod zip_writer { @@ -108,6 +126,7 @@ pub struct FileOptions { last_modified_time: DateTime, permissions: Option, large_file: bool, + encrypt_with: Option, } impl FileOptions { @@ -171,6 +190,10 @@ impl FileOptions { self.large_file = large; self } + pub(crate) fn with_deprecated_encryption(mut self, password: &[u8]) -> FileOptions { + self.encrypt_with = Some(crate::zipcrypto::ZipCryptoKeys::derive(password)); + self + } } impl Default for FileOptions { @@ -196,6 +219,7 @@ impl Default for FileOptions { last_modified_time: DateTime::default(), permissions: None, large_file: false, + encrypt_with: None, } } } @@ -284,7 +308,7 @@ impl ZipWriter { let _ = readwriter.seek(io::SeekFrom::Start(directory_start)); // seek directory_start to overwrite it Ok(ZipWriter { - inner: GenericZipWriter::Storer(readwriter), + inner: GenericZipWriter::Storer(MaybeEncrypted::Unencrypted(readwriter)), files, stats: Default::default(), writing_to_file: false, @@ -302,7 +326,7 @@ impl ZipWriter { /// Before writing to this object, the [`ZipWriter::start_file`] function should be called. pub fn new(inner: W) -> ZipWriter { ZipWriter { - inner: GenericZipWriter::Storer(inner), + inner: GenericZipWriter::Storer(MaybeEncrypted::Unencrypted(inner)), files: Vec::new(), stats: Default::default(), writing_to_file: false, @@ -355,7 +379,7 @@ impl ZipWriter { let mut file = ZipFileData { system: System::Unix, version_made_by: DEFAULT_VERSION, - encrypted: false, + encrypted: options.encrypt_with.is_some(), using_data_descriptor: false, compression_method: options.compression_method, compression_level: options.compression_level, @@ -385,7 +409,13 @@ impl ZipWriter { self.files.push(file); } + if let Some(keys) = options.encrypt_with { + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: core::mem::replace(&mut self.inner, GenericZipWriter::Closed).unwrap(), buffer: vec![], keys }; + let mut crypto_header = [0u8; 12]; + zipwriter.write_all(&crypto_header)?; + self.inner = GenericZipWriter::Storer(MaybeEncrypted::Encrypted(zipwriter)); + } Ok(()) } @@ -395,6 +425,14 @@ impl ZipWriter { self.end_extra_data()?; } self.inner.switch_to(CompressionMethod::Stored, None)?; + match core::mem::replace(&mut self.inner, GenericZipWriter::Closed) { + GenericZipWriter::Storer(MaybeEncrypted::Encrypted(writer)) => { + let crc32 = self.stats.hasher.clone().finalize(); + self.inner = GenericZipWriter::Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) + } + GenericZipWriter::Storer(w) => self.inner = GenericZipWriter::Storer(w), + _ => unreachable!() + } let writer = self.inner.get_plain(); if !self.writing_raw { @@ -985,8 +1023,8 @@ impl GenericZipWriter { fn get_plain(&mut self) -> &mut W { match *self { - GenericZipWriter::Storer(ref mut w) => w, - _ => panic!("Should have switched to stored beforehand"), + GenericZipWriter::Storer(MaybeEncrypted::Unencrypted(ref mut w)) => w, + _ => panic!("Should have switched to stored and unencrypted beforehand"), } } @@ -1009,8 +1047,8 @@ impl GenericZipWriter { fn unwrap(self) -> W { match self { - GenericZipWriter::Storer(w) => w, - _ => panic!("Should have switched to stored beforehand"), + GenericZipWriter::Storer(MaybeEncrypted::Unencrypted(w)) => w, + _ => panic!("Should have switched to stored and unencrypted beforehand"), } } } @@ -1058,7 +1096,7 @@ fn write_local_file_header(writer: &mut T, file: &ZipFileData) -> ZipR 1u16 << 11 } else { 0 - }; + } | if file.encrypted { 1u16 << 0 } else { 0 }; writer.write_u16::(flag)?; // Compression method #[allow(deprecated)] @@ -1133,7 +1171,7 @@ fn write_central_directory_header(writer: &mut T, file: &ZipFileData) 1u16 << 11 } else { 0 - }; + } | if file.encrypted { 1u16 << 0 } else { 0 }; writer.write_u16::(flag)?; // compression method #[allow(deprecated)] @@ -1428,6 +1466,7 @@ mod test { last_modified_time: DateTime::default(), permissions: Some(33188), large_file: false, + encrypt_with: None, }; writer.start_file("mimetype", options).unwrap(); writer diff --git a/src/zipcrypto.rs b/src/zipcrypto.rs index 91d40395..c3696e4d 100644 --- a/src/zipcrypto.rs +++ b/src/zipcrypto.rs @@ -6,7 +6,8 @@ use std::num::Wrapping; /// A container to hold the current key state -struct ZipCryptoKeys { +#[derive(Clone, Copy)] +pub(crate) struct ZipCryptoKeys { key_0: Wrapping, key_1: Wrapping, key_2: Wrapping, @@ -49,6 +50,13 @@ impl ZipCryptoKeys { fn crc32(crc: Wrapping, input: u8) -> Wrapping { (crc >> 8) ^ Wrapping(CRCTABLE[((crc & Wrapping(0xff)).0 as u8 ^ input) as usize]) } + pub(crate) fn derive(password: &[u8]) -> ZipCryptoKeys { + let mut keys = ZipCryptoKeys::new(); + for byte in password.iter() { + keys.update(*byte); + } + keys + } } /// A ZipCrypto reader with unverified password @@ -70,17 +78,10 @@ impl ZipCryptoReader { /// would be impossible to decrypt files that were encrypted with a /// password byte sequence that is unrepresentable in UTF-8. pub fn new(file: R, password: &[u8]) -> ZipCryptoReader { - let mut result = ZipCryptoReader { + ZipCryptoReader { file, - keys: ZipCryptoKeys::new(), - }; - - // Key the cipher by updating the keys with the password. - for byte in password.iter() { - result.keys.update(*byte); + keys: ZipCryptoKeys::derive(password), } - - result } /// Read the ZipCrypto header bytes and validate the password. @@ -122,6 +123,31 @@ impl ZipCryptoReader { Ok(Some(ZipCryptoReaderValid { reader: self })) } } +pub(crate) struct ZipCryptoWriter { + pub(crate) writer: W, + pub(crate) buffer: Vec, + pub(crate) keys: ZipCryptoKeys, +} +impl ZipCryptoWriter { + pub(crate) fn finish(mut self, crc32: u32) -> std::io::Result { + self.buffer[11] = (crc32 >> 24) as u8; + for byte in self.buffer.iter_mut() { + *byte = self.keys.encrypt_byte(*byte); + } + self.writer.write_all(&self.buffer)?; + self.writer.flush()?; + Ok(self.writer) + } +} +impl std::io::Write for ZipCryptoWriter { + fn write(&mut self, buf: &[u8]) -> std::io::Result { + self.buffer.extend_from_slice(buf); + Ok(buf.len()) + } + fn flush(&mut self) -> std::io::Result<()> { + Ok(()) + } +} /// A ZipCrypto reader with verified password pub struct ZipCryptoReaderValid { diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index 6c4d6b81..d831c1e6 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -20,6 +20,23 @@ use std::io::Cursor; use std::io::Read; +#[test] +fn encrypting_file() { + use zip::unstable::write::FileOptionsExt; + use std::io::{Read, Write}; + let mut buf = vec![0; 2048]; + let mut archive = zip::write::ZipWriter::new(std::io::Cursor::new(&mut buf)); + archive.start_file("name", zip::write::FileOptions::default().with_deprecated_encryption(b"password")).unwrap(); + archive.write_all(b"test").unwrap(); + archive.finish().unwrap(); + drop(archive); + let mut archive = zip::ZipArchive::new(std::io::Cursor::new(&mut buf)).unwrap(); + let mut file = archive.by_index_decrypt(0, b"password").unwrap().unwrap(); + let mut buf = Vec::new(); + file.read_to_end(&mut buf).unwrap(); + assert_eq!(buf, b"test"); + +} #[test] fn encrypted_file() { let zip_file_bytes = &mut Cursor::new(vec![ From 80b8d1eceddb6905d52f9a427aee6973a15d4e46 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 6 May 2023 15:50:59 +0100 Subject: [PATCH 04/14] publish 0.6.5 --- CHANGELOG.md | 5 +++++ Cargo.toml | 2 +- README.md | 4 ++-- src/lib.rs | 2 +- 4 files changed, 9 insertions(+), 4 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index cd79e391..4faa68d6 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,10 @@ # Changelog +## [0.6.5] +### Changed + +- Added experimental [`zip::unstable::write::FileOptions::with_deprecated_encryption`] API to enable encrypting files with PKWARE encryption. + ## [0.6.4] ### Changed diff --git a/Cargo.toml b/Cargo.toml index 5468919a..bb219c73 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "zip" -version = "0.6.4" +version = "0.6.5" authors = ["Mathijs van de Nes ", "Marli Frost ", "Ryan Levick "] license = "MIT" repository = "https://github.com/zip-rs/zip.git" diff --git a/README.md b/README.md index d8f91b78..584a747e 100644 --- a/README.md +++ b/README.md @@ -32,14 +32,14 @@ With all default features: ```toml [dependencies] -zip = "0.6.4" +zip = "5" ``` Without the default features: ```toml [dependencies] -zip = { version = "0.6.4", default-features = false } +zip = { version = "0.6.5", default-features = false } ``` The features available are: diff --git a/src/lib.rs b/src/lib.rs index 7f3e7a01..328b7e39 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -50,6 +50,6 @@ mod zipcrypto; /// /// ```toml /// [dependencies] -/// zip = "=0.6.4" +/// zip = "=0.6.5" /// ``` pub mod unstable; From 89989e02a30c0cab262f33c4f69d14b46cce4413 Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Mon, 8 May 2023 18:54:35 -0700 Subject: [PATCH 05/14] Reformat --- src/unstable.rs | 4 ++-- src/write.rs | 6 +++++- src/zipcrypto.rs | 1 - tests/zip_crypto.rs | 10 +++++++--- 4 files changed, 14 insertions(+), 7 deletions(-) diff --git a/src/unstable.rs b/src/unstable.rs index f8b46a97..cc03ff9a 100644 --- a/src/unstable.rs +++ b/src/unstable.rs @@ -8,7 +8,7 @@ pub mod write { /// Unstable methods for [`FileOptions`]. pub trait FileOptionsExt { /// Write the file with the given password using the deprecated ZipCrypto algorithm. - /// + /// /// This is not recommended for new archives, as ZipCrypto is not secure. fn with_deprecated_encryption(self, password: &[u8]) -> Self; } @@ -17,4 +17,4 @@ pub mod write { self.with_deprecated_encryption(password) } } -} \ No newline at end of file +} diff --git a/src/write.rs b/src/write.rs index 45f36452..4c2fea55 100644 --- a/src/write.rs +++ b/src/write.rs @@ -475,7 +475,11 @@ impl ZipWriter { self.stats.hasher = Hasher::new(); } if let Some(keys) = options.encrypt_with { - let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: mem::replace(&mut self.inner, Closed).unwrap(), buffer: vec![], keys }; + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { + writer: mem::replace(&mut self.inner, Closed).unwrap(), + buffer: vec![], + keys, + }; let crypto_header = [0u8; 12]; zipwriter.write_all(&crypto_header)?; diff --git a/src/zipcrypto.rs b/src/zipcrypto.rs index bddc6408..7ad8ddcb 100644 --- a/src/zipcrypto.rs +++ b/src/zipcrypto.rs @@ -8,7 +8,6 @@ use std::fmt::{Debug, Formatter}; use std::hash::{Hash, Hasher}; use std::num::Wrapping; - /// A container to hold the current key state #[derive(Clone, Copy, Hash, Ord, PartialOrd, Eq, PartialEq)] pub(crate) struct ZipCryptoKeys { diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index af39e275..0f112cf5 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -22,11 +22,16 @@ use std::io::Read; #[test] fn encrypting_file() { - use zip::unstable::write::FileOptionsExt; use std::io::{Read, Write}; + use zip::unstable::write::FileOptionsExt; let mut buf = vec![0; 2048]; let mut archive = zip::write::ZipWriter::new(Cursor::new(&mut buf)); - archive.start_file("name", zip::write::FileOptions::default().with_deprecated_encryption(b"password")).unwrap(); + archive + .start_file( + "name", + zip::write::FileOptions::default().with_deprecated_encryption(b"password"), + ) + .unwrap(); archive.write_all(b"test").unwrap(); archive.finish().unwrap(); drop(archive); @@ -35,7 +40,6 @@ fn encrypting_file() { let mut buf = Vec::new(); file.read_to_end(&mut buf).unwrap(); assert_eq!(buf, b"test"); - } #[test] fn encrypted_file() { From 6c4ae5333a1860ca3b183953409f447adbeeed0a Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Mon, 8 May 2023 18:55:28 -0700 Subject: [PATCH 06/14] Fix merge --- CHANGELOG.md | 4 ++-- tests/zip_crypto.rs | 8 ++++---- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 4a64c400..da190dc7 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -116,5 +116,5 @@ ### Changed -- Added experimental [`zip::unstable::write::FileOptions::with_deprecated_encryption`] API to enable encrypting files - with PKWARE encryption. +- Added experimental [`zip_next::unstable::write::FileOptions::with_deprecated_encryption`] API to enable encrypting + files with PKWARE encryption. diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index 0f112cf5..45612aac 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -23,19 +23,19 @@ use std::io::Read; #[test] fn encrypting_file() { use std::io::{Read, Write}; - use zip::unstable::write::FileOptionsExt; + use zip_next::unstable::write::FileOptionsExt; let mut buf = vec![0; 2048]; - let mut archive = zip::write::ZipWriter::new(Cursor::new(&mut buf)); + let mut archive = zip_next::write::ZipWriter::new(Cursor::new(&mut buf)); archive .start_file( "name", - zip::write::FileOptions::default().with_deprecated_encryption(b"password"), + zip_next::write::FileOptions::default().with_deprecated_encryption(b"password"), ) .unwrap(); archive.write_all(b"test").unwrap(); archive.finish().unwrap(); drop(archive); - let mut archive = zip::ZipArchive::new(Cursor::new(&mut buf)).unwrap(); + let mut archive = zip_next::ZipArchive::new(Cursor::new(&mut buf)).unwrap(); let mut file = archive.by_index_decrypt(0, b"password").unwrap().unwrap(); let mut buf = Vec::new(); file.read_to_end(&mut buf).unwrap(); From b179709639527e91531c0c6f99ebf8c06ddcfb7f Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Mon, 8 May 2023 19:07:42 -0700 Subject: [PATCH 07/14] Bug fix: derive Arbitrary for ZipCryptoKeys --- src/zipcrypto.rs | 1 + 1 file changed, 1 insertion(+) diff --git a/src/zipcrypto.rs b/src/zipcrypto.rs index 7ad8ddcb..2e97a647 100644 --- a/src/zipcrypto.rs +++ b/src/zipcrypto.rs @@ -9,6 +9,7 @@ use std::hash::{Hash, Hasher}; use std::num::Wrapping; /// A container to hold the current key state +#[cfg_attr(fuzzing, derive(arbitrary::Arbitrary))] #[derive(Clone, Copy, Hash, Ord, PartialOrd, Eq, PartialEq)] pub(crate) struct ZipCryptoKeys { key_0: Wrapping, From 5bb40012d20f8f00846a7edb96b886311b286eac Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Mon, 8 May 2023 19:37:55 -0700 Subject: [PATCH 08/14] WIP: Fix upstream merge --- src/read.rs | 2 +- src/write.rs | 18 ++++++++++-------- 2 files changed, 11 insertions(+), 9 deletions(-) diff --git a/src/read.rs b/src/read.rs index 75096950..bb2855b6 100644 --- a/src/read.rs +++ b/src/read.rs @@ -57,7 +57,7 @@ pub(crate) mod zip_archive { /// for i in 0..zip.len() { /// let mut file = zip.by_index(i)?; /// println!("Filename: {}", file.name()); - /// std::io::copy(&mut file, &mut std::io::stdout()); + /// std::io::copy(&mut file, &mut std::io::stdout())?; /// } /// /// Ok(()) diff --git a/src/write.rs b/src/write.rs index 4c2fea55..a5f47083 100644 --- a/src/write.rs +++ b/src/write.rs @@ -475,12 +475,8 @@ impl ZipWriter { self.stats.hasher = Hasher::new(); } if let Some(keys) = options.encrypt_with { - let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { - writer: mem::replace(&mut self.inner, Closed).unwrap(), - buffer: vec![], - keys, - }; - let crypto_header = [0u8; 12]; + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: core::mem::replace(&mut self.inner, GenericZipWriter::Closed).unwrap(), buffer: vec![], keys }; + let mut crypto_header = [0u8; 12]; zipwriter.write_all(&crypto_header)?; self.inner = Storer(MaybeEncrypted::Encrypted(zipwriter)); @@ -509,9 +505,15 @@ impl ZipWriter { // Implicitly calling [`ZipWriter::end_extra_data`] for empty files. self.end_extra_data()?; } - let make_plain_writer = self + let make_plain_writer = match self .inner - .prepare_next_writer(CompressionMethod::Stored, None)?; + .prepare_next_writer(CompressionMethod::Stored, None)? { + MaybeEncrypted::Encrypted(writer) => { + let crc32 = self.stats.hasher.clone().finalize(); + self.inner = Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) + }, + MaybeEncrypted::Unencrypted(writer) => writer + } self.inner.switch_to(make_plain_writer)?; let writer = self.inner.get_plain(); From 9efec6b61fbfedd4109750f4699a3349ccb4f3bf Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 12:53:30 -0700 Subject: [PATCH 09/14] Fix merge --- src/write.rs | 20 ++++++++------------ src/zipcrypto.rs | 2 ++ 2 files changed, 10 insertions(+), 12 deletions(-) diff --git a/src/write.rs b/src/write.rs index a5f47083..de5d9e23 100644 --- a/src/write.rs +++ b/src/write.rs @@ -475,8 +475,8 @@ impl ZipWriter { self.stats.hasher = Hasher::new(); } if let Some(keys) = options.encrypt_with { - let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: core::mem::replace(&mut self.inner, GenericZipWriter::Closed).unwrap(), buffer: vec![], keys }; - let mut crypto_header = [0u8; 12]; + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: mem::replace(&mut self.inner, Closed).unwrap(), buffer: vec![], keys }; + let crypto_header = [0u8; 12]; zipwriter.write_all(&crypto_header)?; self.inner = Storer(MaybeEncrypted::Encrypted(zipwriter)); @@ -505,15 +505,9 @@ impl ZipWriter { // Implicitly calling [`ZipWriter::end_extra_data`] for empty files. self.end_extra_data()?; } - let make_plain_writer = match self + let make_plain_writer = self .inner - .prepare_next_writer(CompressionMethod::Stored, None)? { - MaybeEncrypted::Encrypted(writer) => { - let crc32 = self.stats.hasher.clone().finalize(); - self.inner = Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) - }, - MaybeEncrypted::Unencrypted(writer) => writer - } + .prepare_next_writer(CompressionMethod::Stored, None)?; self.inner.switch_to(make_plain_writer)?; let writer = self.inner.get_plain(); @@ -1036,12 +1030,14 @@ impl Drop for ZipWriter { } } +type SwitchWriterFunction = Box) -> GenericZipWriter>; + impl GenericZipWriter { fn prepare_next_writer( &self, compression: CompressionMethod, compression_level: Option, - ) -> ZipResult) -> GenericZipWriter>> { + ) -> ZipResult> { if let Closed = self { return Err( io::Error::new(io::ErrorKind::BrokenPipe, "ZipWriter was already closed").into(), @@ -1121,7 +1117,7 @@ impl GenericZipWriter { fn switch_to( &mut self, - make_new_self: Box) -> GenericZipWriter>, + make_new_self: SwitchWriterFunction, ) -> ZipResult<()> { let bare = match mem::replace(self, Closed) { Storer(w) => w, diff --git a/src/zipcrypto.rs b/src/zipcrypto.rs index 2e97a647..71af39e3 100644 --- a/src/zipcrypto.rs +++ b/src/zipcrypto.rs @@ -135,12 +135,14 @@ impl ZipCryptoReader { Ok(Some(ZipCryptoReaderValid { reader: self })) } } +#[allow(unused)] pub(crate) struct ZipCryptoWriter { pub(crate) writer: W, pub(crate) buffer: Vec, pub(crate) keys: ZipCryptoKeys, } impl ZipCryptoWriter { + #[allow(unused)] pub(crate) fn finish(mut self, crc32: u32) -> std::io::Result { self.buffer[11] = (crc32 >> 24) as u8; for byte in self.buffer.iter_mut() { From 82cd28af3c2dec6ce59242ece8d3cf8f03833a2e Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 12:55:20 -0700 Subject: [PATCH 10/14] Reformat --- src/write.rs | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/src/write.rs b/src/write.rs index de5d9e23..5652933c 100644 --- a/src/write.rs +++ b/src/write.rs @@ -475,7 +475,11 @@ impl ZipWriter { self.stats.hasher = Hasher::new(); } if let Some(keys) = options.encrypt_with { - let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { writer: mem::replace(&mut self.inner, Closed).unwrap(), buffer: vec![], keys }; + let mut zipwriter = crate::zipcrypto::ZipCryptoWriter { + writer: mem::replace(&mut self.inner, Closed).unwrap(), + buffer: vec![], + keys, + }; let crypto_header = [0u8; 12]; zipwriter.write_all(&crypto_header)?; @@ -1115,10 +1119,7 @@ impl GenericZipWriter { } } - fn switch_to( - &mut self, - make_new_self: SwitchWriterFunction, - ) -> ZipResult<()> { + fn switch_to(&mut self, make_new_self: SwitchWriterFunction) -> ZipResult<()> { let bare = match mem::replace(self, Closed) { Storer(w) => w, #[cfg(any( From 7c39dbd4c2f332420f6661e66d67e941121b9938 Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 13:01:01 -0700 Subject: [PATCH 11/14] Bug fix --- CHANGELOG.md | 2 +- src/write.rs | 8 ++++++++ 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index da190dc7..be5fc267 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -114,7 +114,7 @@ ## [0.7.4] -### Changed +### Merged from upstream - Added experimental [`zip_next::unstable::write::FileOptions::with_deprecated_encryption`] API to enable encrypting files with PKWARE encryption. diff --git a/src/write.rs b/src/write.rs index 5652933c..6a41d337 100644 --- a/src/write.rs +++ b/src/write.rs @@ -513,6 +513,14 @@ impl ZipWriter { .inner .prepare_next_writer(CompressionMethod::Stored, None)?; self.inner.switch_to(make_plain_writer)?; + match mem::replace(&mut self.inner, Closed) { + Storer(MaybeEncrypted::Encrypted(writer)) => { + let crc32 = self.stats.hasher.clone().finalize(); + self.inner = Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) + } + Storer(w) => self.inner = Storer(w), + _ => unreachable!() + } let writer = self.inner.get_plain(); if !self.writing_raw { From ab302b20b74e71c3b9b559192f5758a0d88dacf2 Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 13:04:54 -0700 Subject: [PATCH 12/14] Reformat --- src/write.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/write.rs b/src/write.rs index 6a41d337..fdfcd8bc 100644 --- a/src/write.rs +++ b/src/write.rs @@ -519,7 +519,7 @@ impl ZipWriter { self.inner = Storer(MaybeEncrypted::Unencrypted(writer.finish(crc32)?)) } Storer(w) => self.inner = Storer(w), - _ => unreachable!() + _ => unreachable!(), } let writer = self.inner.get_plain(); From bb85ef1de1b122174005478316dafa9a00bb4f8c Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 13:06:15 -0700 Subject: [PATCH 13/14] Update dependencies --- Cargo.toml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Cargo.toml b/Cargo.toml index 576716ad..88e3a3ce 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -22,7 +22,7 @@ flate2 = { version = "1.0.26", default-features = false, optional = true } hmac = { version = "0.12.1", optional = true, features = ["reset"] } pbkdf2 = {version = "0.12.1", optional = true } sha1 = {version = "0.10.5", optional = true } -time = { version = "0.3.20", optional = true, default-features = false, features = ["std"] } +time = { version = "0.3.21", optional = true, default-features = false, features = ["std"] } zstd = { version = "0.12.3", optional = true } [target.'cfg(any(all(target_arch = "arm", target_pointer_width = "32"), target_arch = "mips", target_arch = "powerpc"))'.dependencies] @@ -35,7 +35,7 @@ arbitrary = { version = "1.3.0", features = ["derive"] } bencher = "0.1.5" getrandom = "0.2.9" walkdir = "2.3.3" -time = { version = "0.3.20", features = ["formatting", "macros"] } +time = { version = "0.3.21", features = ["formatting", "macros"] } [features] aes-crypto = [ "aes", "constant_time_eq", "hmac", "pbkdf2", "sha1" ] From 3f8e7ec12cb857f7634e050829967888b8ec8a41 Mon Sep 17 00:00:00 2001 From: Chris Hennick Date: Wed, 10 May 2023 13:06:55 -0700 Subject: [PATCH 14/14] Bump version to 0.7.4 --- Cargo.toml | 2 +- README.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Cargo.toml b/Cargo.toml index 88e3a3ce..f8068edf 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "zip_next" -version = "0.7.3" +version = "0.7.4" authors = ["Mathijs van de Nes ", "Marli Frost ", "Ryan Levick ", "Chris Hennick "] license = "MIT" diff --git a/README.md b/README.md index 2eeeafa3..a52116eb 100644 --- a/README.md +++ b/README.md @@ -32,14 +32,14 @@ With all default features: ```toml [dependencies] -zip_next = "0.7.3" +zip_next = "0.7.4" ``` Without the default features: ```toml [dependencies] -zip_next = { version = "0.7.3", default-features = false } +zip_next = { version = "0.7.4", default-features = false } ``` The features available are: