From d0e905acc513395ae398654e1ebecc428ede3e76 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 10:38:47 +0100 Subject: [PATCH] feat: provide archive extraction API --- src/read.rs | 46 ++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 44 insertions(+), 2 deletions(-) diff --git a/src/read.rs b/src/read.rs index 8d04a7a1..b25862b5 100644 --- a/src/read.rs +++ b/src/read.rs @@ -311,6 +311,49 @@ impl ZipArchive { comment: footer.zip_file_comment, }) } + /// Extract a Zip archive into a directory. + /// + /// Malformed and malicious paths are rejected so that they cannot escape + /// the given directory. + /// + /// This bails on the first error and does not attempt cleanup. + /// + /// # Platform-specific behaviour + /// + /// On unix systems permissions from the zip file are preserved, if they exist. + pub fn extract>(&mut self, directory: P) -> ZipResult<()> { + use std::fs; + + for i in 0..self.len() { + let mut file = self.by_index(i)?; + let filepath = file + .name_as_child() + .ok_or(ZipError::InvalidArchive("Invalid file path"))?; + + let outpath = directory.as_ref().join(filepath); + + if (file.name()).ends_with('/') { + fs::create_dir_all(&outpath)?; + } else { + if let Some(p) = outpath.parent() { + if !p.exists() { + fs::create_dir_all(&p)?; + } + } + let mut outfile = fs::File::create(&outpath)?; + io::copy(&mut file, &mut outfile)?; + } + // Get and Set permissions + #[cfg(unix)] + { + use std::os::unix::fs::PermissionsExt; + if let Some(mode) = file.unix_mode() { + fs::set_permissions(&outpath, fs::Permissions::from_mode(mode))?; + } + } + } + Ok(()) + } /// Number of files contained in this zip. pub fn len(&self) -> usize { @@ -967,8 +1010,7 @@ mod test { for i in 0..zip.len() { let zip_file = zip.by_index(i).unwrap(); - #[allow(deprecated)] - let full_name = zip_file.sanitized_name(); + let full_name = zip_file.name_as_child().unwrap(); let file_name = full_name.file_name().unwrap().to_str().unwrap(); assert!( (file_name.starts_with("dir") && zip_file.is_dir())