From 5c4f0906f8dd99e1924bd21d0029d1c2a1eec3e3 Mon Sep 17 00:00:00 2001 From: Davide Romanini Date: Sun, 19 Apr 2020 20:33:14 +0200 Subject: [PATCH 01/14] allow for garbage after comment data --- src/spec.rs | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/src/spec.rs b/src/spec.rs index 8fa8c5c1..63d4d287 100644 --- a/src/spec.rs +++ b/src/spec.rs @@ -66,11 +66,9 @@ impl CentralDirectoryEnd { reader.seek(io::SeekFrom::Current( BYTES_BETWEEN_MAGIC_AND_COMMENT_SIZE as i64, ))?; - let comment_length = reader.read_u16::()? as u64; - if file_length - pos - HEADER_SIZE == comment_length { - let cde_start_pos = reader.seek(io::SeekFrom::Start(pos as u64))?; - return CentralDirectoryEnd::parse(reader).map(|cde| (cde, cde_start_pos)); - } + + let cde_start_pos = reader.seek(io::SeekFrom::Start(pos as u64))?; + return CentralDirectoryEnd::parse(reader).map(|cde| (cde, cde_start_pos)); } pos = match pos.checked_sub(1) { Some(p) => p, From b91f48a2242c270d1d80c6338cdca039dcc5b545 Mon Sep 17 00:00:00 2001 From: Davide Romanini Date: Thu, 13 Aug 2020 15:53:38 +0200 Subject: [PATCH 02/14] fix fmt --- src/spec.rs | 1 - 1 file changed, 1 deletion(-) diff --git a/src/spec.rs b/src/spec.rs index 63d4d287..91966b67 100644 --- a/src/spec.rs +++ b/src/spec.rs @@ -66,7 +66,6 @@ impl CentralDirectoryEnd { reader.seek(io::SeekFrom::Current( BYTES_BETWEEN_MAGIC_AND_COMMENT_SIZE as i64, ))?; - let cde_start_pos = reader.seek(io::SeekFrom::Start(pos as u64))?; return CentralDirectoryEnd::parse(reader).map(|cde| (cde, cde_start_pos)); } From 5eefdf8271e5cfccbe01b84721b699742318c7c8 Mon Sep 17 00:00:00 2001 From: Davide Romanini Date: Wed, 19 Aug 2020 18:53:58 +0200 Subject: [PATCH 03/14] add test for handling comment garbage --- tests/data/comment_garbage.zip | Bin 0 -> 46 bytes tests/zip_comment_garbage.rs | 30 ++++++++++++++++++++++++++++++ 2 files changed, 30 insertions(+) create mode 100644 tests/data/comment_garbage.zip create mode 100644 tests/zip_comment_garbage.rs diff --git a/tests/data/comment_garbage.zip b/tests/data/comment_garbage.zip new file mode 100644 index 0000000000000000000000000000000000000000..f6a289e817b4686757c5c421b2e7958aa08b1068 GIT binary patch literal 46 hcmWIWW@TeQ18fY%8TmyedilAzsd*&|NjZry3;>a|35Wmy literal 0 HcmV?d00001 diff --git a/tests/zip_comment_garbage.rs b/tests/zip_comment_garbage.rs new file mode 100644 index 00000000..ef4d9750 --- /dev/null +++ b/tests/zip_comment_garbage.rs @@ -0,0 +1,30 @@ +// Some zip files can contain garbage after the comment. For example, python zipfile generates +// it when opening a zip in 'a' mode: +// +// >>> from zipfile import ZipFile +// >>> with ZipFile('comment_garbage.zip', 'a') as z: +// ... z.comment = b'long comment bla bla bla' +// ... +// >>> with ZipFile('comment_garbage.zip', 'a') as z: +// ... z.comment = b'short.' +// ... +// >>> +// +// Hexdump: +// +// 00000000 50 4b 05 06 00 00 00 00 00 00 00 00 00 00 00 00 |PK..............| +// 00000010 00 00 00 00 06 00 73 68 6f 72 74 2e 6f 6d 6d 65 |......short.omme| +// 00000020 6e 74 20 62 6c 61 20 62 6c 61 20 62 6c 61 |nt bla bla bla| +// 0000002e + +use std::io; +use zip::ZipArchive; + +#[test] +fn correctly_handle_zip_with_garbage_after_comment() { + let mut v = Vec::new(); + v.extend_from_slice(include_bytes!("../tests/data/comment_garbage.zip")); + let archive = ZipArchive::new(io::Cursor::new(v)).expect("couldn't open test zip file"); + + assert_eq!(archive.comment(), "short.".as_bytes()); +} From fb5105725ff2a6344cdff7eba62bbd8e78576842 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 10:32:10 +0100 Subject: [PATCH 04/14] refactor: reintroduce path sanitization strategy I've documented the drawbacks of this strategy to make sure users are aware of the tradeoff being made. --- src/read.rs | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/src/read.rs b/src/read.rs index d19b353f..cf16c626 100644 --- a/src/read.rs +++ b/src/read.rs @@ -9,6 +9,7 @@ use crate::zipcrypto::ZipCryptoReaderValid; use std::borrow::Cow; use std::collections::HashMap; use std::io::{self, prelude::*}; +use std::path::Component; use crate::cp437::FromCp437; use crate::types::{DateTime, System, ZipFileData}; @@ -564,11 +565,21 @@ impl<'a> ZipFile<'a> { } /// Get the name of the file + /// + /// # Warnings + /// + /// It is dangerous to use this name directly when extracting an archive. + /// It may contain an absolute path (`/etc/shadow`), or break out of the + /// current directory (`../runtime`). Carelessly writing to these paths + /// allows an attacker to craft a ZIP archive that will overwrite critical + /// files. pub fn name(&self) -> &str { &self.data.file_name } /// Get the name of the file, in the raw (internal) byte representation. + /// + /// The encoding of this data is currently undefined. pub fn name_raw(&self) -> &[u8] { &self.data.file_name_raw } @@ -578,9 +589,24 @@ impl<'a> ZipFile<'a> { #[deprecated( since = "0.5.7", note = "by stripping `..`s from the path, the meaning of paths can change. - You must use a sanitization strategy that's appropriate for your input" + `mangled_name` can be used if this behaviour is desirable" )] pub fn sanitized_name(&self) -> ::std::path::PathBuf { + self.mangled_name() + } + + /// Rewrite the path, ignoring any path components with special meaning. + /// + /// - Absolute paths are made relative + /// - [`ParentDir`]s are ignored + /// - Truncates the filename at a NULL byte + /// + /// This is appropriate if you need to be able to extract *something* from + /// any archive, but will easily misrepresent trivial paths like + /// `foo/../bar` as `foo/bar` (instead of `bar`). + /// + /// [`ParentDir`]: `Component::ParentDir` + pub fn mangled_name(&self) -> ::std::path::PathBuf { self.data.file_name_sanitized() } From 103003388c1cbbbcc9bca0eb6f5b76b642171fb0 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 10:36:41 +0100 Subject: [PATCH 05/14] feat: implement a defensive sanitisation strategy --- src/read.rs | 35 +++++++++++++++++++++++++++++++++-- 1 file changed, 33 insertions(+), 2 deletions(-) diff --git a/src/read.rs b/src/read.rs index cf16c626..8d04a7a1 100644 --- a/src/read.rs +++ b/src/read.rs @@ -9,7 +9,7 @@ use crate::zipcrypto::ZipCryptoReaderValid; use std::borrow::Cow; use std::collections::HashMap; use std::io::{self, prelude::*}; -use std::path::Component; +use std::path::{Component, Path}; use crate::cp437::FromCp437; use crate::types::{DateTime, System, ZipFileData}; @@ -573,6 +573,9 @@ impl<'a> ZipFile<'a> { /// current directory (`../runtime`). Carelessly writing to these paths /// allows an attacker to craft a ZIP archive that will overwrite critical /// files. + /// + /// You can use the [`ZipFile::name_as_child`] method to validate the name + /// as a safe path. pub fn name(&self) -> &str { &self.data.file_name } @@ -603,13 +606,41 @@ impl<'a> ZipFile<'a> { /// /// This is appropriate if you need to be able to extract *something* from /// any archive, but will easily misrepresent trivial paths like - /// `foo/../bar` as `foo/bar` (instead of `bar`). + /// `foo/../bar` as `foo/bar` (instead of `bar`). Because of this, + /// [`ZipFile::name_as_child`] is the better option in most scenarios. /// /// [`ParentDir`]: `Component::ParentDir` pub fn mangled_name(&self) -> ::std::path::PathBuf { self.data.file_name_sanitized() } + /// Ensure the file path is safe to use as a [`Path`]. + /// + /// - It can't contain NULL bytes + /// - It can't resolve to a path outside the current directory + /// > `foo/../bar` is fine, `foo/../../bar` is not. + /// - It can't be an absolute path + /// + /// This will read well-formed ZIP files correctly, and is resistant + /// to path-based exploits. It is recommended over + /// [`ZipFile::mangled_name`]. + pub fn name_as_child(&self) -> Option<&Path> { + if self.data.file_name.contains('\0') { + return None; + } + let path = Path::new(&self.data.file_name); + let mut depth = 0usize; + for component in path.components() { + match component { + Component::Prefix(_) | Component::RootDir => return None, + Component::ParentDir => depth = depth.checked_sub(1)?, + Component::Normal(_) => depth += 1, + Component::CurDir => (), + } + } + Some(path) + } + /// Get the comment of the file pub fn comment(&self) -> &str { &self.data.file_comment From a35c8ffa91fdd212d7ce1325f504514fb2b039bd Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 10:37:33 +0100 Subject: [PATCH 06/14] chore: update tests to use preferred method --- examples/extract.rs | 14 ++++++-------- examples/file_info.rs | 13 +++++++++---- tests/zip64_large.rs | 5 ++--- tests/zip_crypto.rs | 3 +-- 4 files changed, 18 insertions(+), 17 deletions(-) diff --git a/examples/extract.rs b/examples/extract.rs index fcd23e3a..5aa67570 100644 --- a/examples/extract.rs +++ b/examples/extract.rs @@ -18,8 +18,10 @@ fn real_main() -> i32 { for i in 0..archive.len() { let mut file = archive.by_index(i).unwrap(); - #[allow(deprecated)] - let outpath = file.sanitized_name(); + let outpath = match file.name_as_child() { + Some(path) => path, + None => continue, + }; { let comment = file.comment(); @@ -29,17 +31,13 @@ fn real_main() -> i32 { } if (&*file.name()).ends_with('/') { - println!( - "File {} extracted to \"{}\"", - i, - outpath.as_path().display() - ); + println!("File {} extracted to \"{}\"", i, outpath.display()); fs::create_dir_all(&outpath).unwrap(); } else { println!( "File {} extracted to \"{}\" ({} bytes)", i, - outpath.as_path().display(), + outpath.display(), file.size() ); if let Some(p) = outpath.parent() { diff --git a/examples/file_info.rs b/examples/file_info.rs index bed1b818..dd72e776 100644 --- a/examples/file_info.rs +++ b/examples/file_info.rs @@ -19,8 +19,13 @@ fn real_main() -> i32 { for i in 0..archive.len() { let file = archive.by_index(i).unwrap(); - #[allow(deprecated)] - let outpath = file.sanitized_name(); + let outpath = match file.name_as_child() { + Some(path) => path, + None => { + println!("Entry {} has a suspicious path", file.name()); + continue; + } + }; { let comment = file.comment(); @@ -33,13 +38,13 @@ fn real_main() -> i32 { println!( "Entry {} is a directory with name \"{}\"", i, - outpath.as_path().display() + outpath.display() ); } else { println!( "Entry {} is a file with name \"{}\" ({} bytes)", i, - outpath.as_path().display(), + outpath.display(), file.size() ); } diff --git a/tests/zip64_large.rs b/tests/zip64_large.rs index c4b5a6b4..ae790a54 100644 --- a/tests/zip64_large.rs +++ b/tests/zip64_large.rs @@ -195,12 +195,11 @@ fn zip64_large() { for i in 0..archive.len() { let mut file = archive.by_index(i).unwrap(); - #[allow(deprecated)] - let outpath = file.sanitized_name(); + let outpath = file.name_as_child().unwrap(); println!( "Entry {} has name \"{}\" ({} bytes)", i, - outpath.as_path().display(), + outpath.display(), file.size() ); diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index aabe40d6..26626495 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -75,8 +75,7 @@ fn encrypted_file() { .by_index_decrypt(0, "test".as_bytes()) .unwrap() .unwrap(); - #[allow(deprecated)] - let file_name = file.sanitized_name(); + let file_name = file.name_as_child().unwrap(); assert_eq!(file_name, std::path::PathBuf::from("test.txt")); let mut data = Vec::new(); From d0e905acc513395ae398654e1ebecc428ede3e76 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 10:38:47 +0100 Subject: [PATCH 07/14] feat: provide archive extraction API --- src/read.rs | 46 ++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 44 insertions(+), 2 deletions(-) diff --git a/src/read.rs b/src/read.rs index 8d04a7a1..b25862b5 100644 --- a/src/read.rs +++ b/src/read.rs @@ -311,6 +311,49 @@ impl ZipArchive { comment: footer.zip_file_comment, }) } + /// Extract a Zip archive into a directory. + /// + /// Malformed and malicious paths are rejected so that they cannot escape + /// the given directory. + /// + /// This bails on the first error and does not attempt cleanup. + /// + /// # Platform-specific behaviour + /// + /// On unix systems permissions from the zip file are preserved, if they exist. + pub fn extract>(&mut self, directory: P) -> ZipResult<()> { + use std::fs; + + for i in 0..self.len() { + let mut file = self.by_index(i)?; + let filepath = file + .name_as_child() + .ok_or(ZipError::InvalidArchive("Invalid file path"))?; + + let outpath = directory.as_ref().join(filepath); + + if (file.name()).ends_with('/') { + fs::create_dir_all(&outpath)?; + } else { + if let Some(p) = outpath.parent() { + if !p.exists() { + fs::create_dir_all(&p)?; + } + } + let mut outfile = fs::File::create(&outpath)?; + io::copy(&mut file, &mut outfile)?; + } + // Get and Set permissions + #[cfg(unix)] + { + use std::os::unix::fs::PermissionsExt; + if let Some(mode) = file.unix_mode() { + fs::set_permissions(&outpath, fs::Permissions::from_mode(mode))?; + } + } + } + Ok(()) + } /// Number of files contained in this zip. pub fn len(&self) -> usize { @@ -967,8 +1010,7 @@ mod test { for i in 0..zip.len() { let zip_file = zip.by_index(i).unwrap(); - #[allow(deprecated)] - let full_name = zip_file.sanitized_name(); + let full_name = zip_file.name_as_child().unwrap(); let file_name = full_name.file_name().unwrap().to_str().unwrap(); assert!( (file_name.starts_with("dir") && zip_file.is_dir()) From 33a787ec546d30518c6b54c347dee587dbee58b2 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Sat, 12 Sep 2020 11:10:19 +0100 Subject: [PATCH 08/14] fix: overlapping borrows on unix platforms When cfg(unix), the `outpatj` meeded to last until the `set_permissions` call, but it can't exist during the `io::copy` --- examples/extract.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/extract.rs b/examples/extract.rs index 5aa67570..8eeee9f6 100644 --- a/examples/extract.rs +++ b/examples/extract.rs @@ -19,7 +19,7 @@ fn real_main() -> i32 { for i in 0..archive.len() { let mut file = archive.by_index(i).unwrap(); let outpath = match file.name_as_child() { - Some(path) => path, + Some(path) => path.to_owned(), None => continue, }; From 219bb9b67c25cfdf0c1d770825d8b5f450226329 Mon Sep 17 00:00:00 2001 From: Alexander Zaitsev Date: Fri, 30 Oct 2020 19:11:00 +0300 Subject: [PATCH 09/14] Fix typo in README Just a very-very-very-very small fix in README :) --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 9a062c57..8bf6da7b 100644 --- a/README.md +++ b/README.md @@ -65,7 +65,7 @@ Examples See the [examples directory](examples) for: * How to write a file to a zip. - * how to write a directory of files to a zip (using [walkdir](https://github.com/BurntSushi/walkdir)). + * How to write a directory of files to a zip (using [walkdir](https://github.com/BurntSushi/walkdir)). * How to extract a zip file. * How to extract a single file from a zip. * How to read a zip from the standard input. From 5843d17d4cbd0aa337e3220efde43a9c4eded0c6 Mon Sep 17 00:00:00 2001 From: Robert Marcano Date: Mon, 31 Aug 2020 16:57:16 -0400 Subject: [PATCH 10/14] Add new APIs that allow copying zip file entries between zip files The copy is done directly using the raw compressed data, avoiding decompression and recompression. --- src/read.rs | 80 ++++++++++++++++++------ src/write.rs | 148 +++++++++++++++++++++++++++++++++++++------- tests/end_to_end.rs | 74 ++++++++++++++++++---- 3 files changed, 250 insertions(+), 52 deletions(-) diff --git a/src/read.rs b/src/read.rs index d19b353f..ea8b78b1 100644 --- a/src/read.rs +++ b/src/read.rs @@ -80,6 +80,7 @@ impl<'a> CryptoReader<'a> { enum ZipFileReader<'a> { NoReader, + Raw(io::Take<&'a mut dyn io::Read>), Stored(Crc32Reader>), #[cfg(any( feature = "deflate", @@ -95,6 +96,7 @@ impl<'a> Read for ZipFileReader<'a> { fn read(&mut self, buf: &mut [u8]) -> io::Result { match self { ZipFileReader::NoReader => panic!("ZipFileReader was in an invalid state"), + ZipFileReader::Raw(r) => r.read(buf), ZipFileReader::Stored(r) => r.read(buf), #[cfg(any( feature = "deflate", @@ -113,6 +115,7 @@ impl<'a> ZipFileReader<'a> { pub fn into_inner(self) -> io::Take<&'a mut dyn Read> { match self { ZipFileReader::NoReader => panic!("ZipFileReader was in an invalid state"), + ZipFileReader::Raw(r) => r, ZipFileReader::Stored(r) => r.into_inner().into_inner(), #[cfg(any( feature = "deflate", @@ -129,15 +132,23 @@ impl<'a> ZipFileReader<'a> { /// A struct for reading a zip file pub struct ZipFile<'a> { data: Cow<'a, ZipFileData>, + crypto_reader: Option>, reader: ZipFileReader<'a>, } -fn make_reader<'a>( +fn make_crypto_reader<'a>( compression_method: crate::compression::CompressionMethod, crc32: u32, reader: io::Take<&'a mut dyn io::Read>, password: Option<&[u8]>, -) -> ZipResult, InvalidPassword>> { +) -> ZipResult, InvalidPassword>> { + #[allow(deprecated)] + { + if let CompressionMethod::Unsupported(_) = compression_method { + return unsupported_zip_error("Compression method not supported"); + } + } + let reader = match password { None => CryptoReader::Plaintext(reader), Some(password) => match ZipCryptoReader::new(reader, password).validate(crc32)? { @@ -145,9 +156,16 @@ fn make_reader<'a>( Some(r) => CryptoReader::ZipCrypto(r), }, }; + Ok(Ok(reader)) +} +fn make_reader<'a>( + compression_method: CompressionMethod, + crc32: u32, + reader: CryptoReader<'a>, +) -> ZipFileReader<'a> { match compression_method { - CompressionMethod::Stored => Ok(Ok(ZipFileReader::Stored(Crc32Reader::new(reader, crc32)))), + CompressionMethod::Stored => ZipFileReader::Stored(Crc32Reader::new(reader, crc32)), #[cfg(any( feature = "deflate", feature = "deflate-miniz", @@ -155,20 +173,14 @@ fn make_reader<'a>( ))] CompressionMethod::Deflated => { let deflate_reader = DeflateDecoder::new(reader); - Ok(Ok(ZipFileReader::Deflated(Crc32Reader::new( - deflate_reader, - crc32, - )))) + ZipFileReader::Deflated(Crc32Reader::new(deflate_reader, crc32)) } #[cfg(feature = "bzip2")] CompressionMethod::Bzip2 => { let bzip2_reader = BzDecoder::new(reader); - Ok(Ok(ZipFileReader::Bzip2(Crc32Reader::new( - bzip2_reader, - crc32, - )))) + ZipFileReader::Bzip2(Crc32Reader::new(bzip2_reader, crc32)) } - _ => unsupported_zip_error("Compression method not supported"), + _ => panic!("Compression method not supported"), } } @@ -420,9 +432,10 @@ impl ZipArchive { self.reader.seek(io::SeekFrom::Start(data.data_start))?; let limit_reader = (self.reader.by_ref() as &mut dyn Read).take(data.compressed_size); - match make_reader(data.compression_method, data.crc32, limit_reader, password) { - Ok(Ok(reader)) => Ok(Ok(ZipFile { - reader, + match make_crypto_reader(data.compression_method, data.crc32, limit_reader, password) { + Ok(Ok(crypto_reader)) => Ok(Ok(ZipFile { + crypto_reader: Some(crypto_reader), + reader: ZipFileReader::NoReader, data: Cow::Borrowed(data), })), Err(e) => Err(e), @@ -555,6 +568,23 @@ fn parse_extra_field(file: &mut ZipFileData, data: &[u8]) -> ZipResult<()> { /// Methods for retrieving information on zip files impl<'a> ZipFile<'a> { + fn get_reader(&mut self) -> &mut ZipFileReader<'a> { + if let ZipFileReader::NoReader = self.reader { + let data = &self.data; + let crypto_reader = self.crypto_reader.take().expect("Invalid reader state"); + self.reader = make_reader(data.compression_method, data.crc32, crypto_reader) + } + &mut self.reader + } + + pub(crate) fn get_raw_reader(&mut self) -> &mut dyn Read { + if let ZipFileReader::NoReader = self.reader { + let crypto_reader = self.crypto_reader.take().expect("Invalid reader state"); + self.reader = ZipFileReader::Raw(crypto_reader.into_inner()) + } + &mut self.reader + } + /// Get the version of the file pub fn version_made_by(&self) -> (u8, u8) { ( @@ -669,7 +699,7 @@ impl<'a> ZipFile<'a> { impl<'a> Read for ZipFile<'a> { fn read(&mut self, buf: &mut [u8]) -> io::Result { - self.reader.read(buf) + self.get_reader().read(buf) } } @@ -681,8 +711,16 @@ impl<'a> Drop for ZipFile<'a> { let mut buffer = [0; 1 << 16]; // Get the inner `Take` reader so all decryption, decompression and CRC calculation is skipped. - let innerreader = ::std::mem::replace(&mut self.reader, ZipFileReader::NoReader); - let mut reader: std::io::Take<&mut dyn std::io::Read> = innerreader.into_inner(); + let mut reader: std::io::Take<&mut dyn std::io::Read> = match &mut self.reader { + ZipFileReader::NoReader => { + let innerreader = ::std::mem::replace(&mut self.crypto_reader, None); + innerreader.expect("Invalid reader state").into_inner() + } + reader => { + let innerreader = ::std::mem::replace(reader, ZipFileReader::NoReader); + innerreader.into_inner() + } + }; loop { match reader.read(&mut buffer) { @@ -789,9 +827,13 @@ pub fn read_zipfile_from_stream<'a, R: io::Read>( let result_crc32 = result.crc32; let result_compression_method = result.compression_method; + let crypto_reader = + make_crypto_reader(result_compression_method, result_crc32, limit_reader, None)?.unwrap(); + Ok(Some(ZipFile { data: Cow::Owned(result), - reader: make_reader(result_compression_method, result_crc32, limit_reader, None)?.unwrap(), + crypto_reader: None, + reader: make_reader(result_compression_method, result_crc32, crypto_reader), })) } diff --git a/src/write.rs b/src/write.rs index b8e97b08..bc688172 100644 --- a/src/write.rs +++ b/src/write.rs @@ -1,6 +1,7 @@ //! Types for creating ZIP archives use crate::compression::CompressionMethod; +use crate::read::ZipFile; use crate::result::{ZipError, ZipResult}; use crate::spec; use crate::types::{DateTime, System, ZipFileData, DEFAULT_VERSION}; @@ -68,6 +69,7 @@ pub struct ZipWriter { stats: ZipWriterStats, writing_to_file: bool, comment: String, + writing_raw: bool, } #[derive(Default)] @@ -77,6 +79,12 @@ struct ZipWriterStats { bytes_written: u64, } +struct ZipRawValues { + crc32: u32, + compressed_size: u64, + uncompressed_size: u64, +} + /// Metadata for a file to be written #[derive(Copy, Clone)] pub struct FileOptions { @@ -197,6 +205,7 @@ impl ZipWriter { stats: Default::default(), writing_to_file: false, comment: String::new(), + writing_raw: false, } } @@ -209,30 +218,40 @@ impl ZipWriter { } /// Start a new file for with the requested options. - fn start_entry(&mut self, name: S, options: FileOptions) -> ZipResult<()> + fn start_entry( + &mut self, + name: S, + options: FileOptions, + raw_values: Option, + ) -> ZipResult<()> where S: Into, { self.finish_file()?; + let is_raw = raw_values.is_some(); + let raw_values = raw_values.unwrap_or_else(|| ZipRawValues { + crc32: 0, + compressed_size: 0, + uncompressed_size: 0, + }); + { let writer = self.inner.get_plain(); let header_start = writer.seek(io::SeekFrom::Current(0))?; let permissions = options.permissions.unwrap_or(0o100644); - let file_name = name.into(); - let file_name_raw = file_name.clone().into_bytes(); let mut file = ZipFileData { system: System::Unix, version_made_by: DEFAULT_VERSION, encrypted: false, compression_method: options.compression_method, last_modified_time: options.last_modified_time, - crc32: 0, - compressed_size: 0, - uncompressed_size: 0, - file_name, - file_name_raw, + crc32: raw_values.crc32, + compressed_size: raw_values.compressed_size, + uncompressed_size: raw_values.uncompressed_size, + file_name: name.into(), + file_name_raw: Vec::new(), // Never used for saving file_comment: String::new(), header_start, data_start: 0, @@ -251,7 +270,12 @@ impl ZipWriter { self.files.push(file); } - self.inner.switch_to(options.compression_method)?; + self.writing_raw = is_raw; + self.inner.switch_to(if is_raw { + CompressionMethod::Stored + } else { + options.compression_method + })?; Ok(()) } @@ -260,20 +284,23 @@ impl ZipWriter { self.inner.switch_to(CompressionMethod::Stored)?; let writer = self.inner.get_plain(); - let file = match self.files.last_mut() { - None => return Ok(()), - Some(f) => f, - }; - file.crc32 = self.stats.hasher.clone().finalize(); - file.uncompressed_size = self.stats.bytes_written; + if !self.writing_raw { + let file = match self.files.last_mut() { + None => return Ok(()), + Some(f) => f, + }; + file.crc32 = self.stats.hasher.clone().finalize(); + file.uncompressed_size = self.stats.bytes_written; - let file_end = writer.seek(io::SeekFrom::Current(0))?; - file.compressed_size = file_end - self.stats.start; + let file_end = writer.seek(io::SeekFrom::Current(0))?; + file.compressed_size = file_end - self.stats.start; - update_local_file_header(writer, file)?; - writer.seek(io::SeekFrom::Start(file_end))?; + update_local_file_header(writer, file)?; + writer.seek(io::SeekFrom::Start(file_end))?; + } self.writing_to_file = false; + self.writing_raw = false; Ok(()) } @@ -288,7 +315,7 @@ impl ZipWriter { options.permissions = Some(0o644); } *options.permissions.as_mut().unwrap() |= 0o100000; - self.start_entry(name, options)?; + self.start_entry(name, options, None)?; self.writing_to_file = true; Ok(()) } @@ -309,6 +336,85 @@ impl ZipWriter { self.start_file(path_to_string(path), options) } + /// Add a new file using the already compressed data from a ZIP file being read and renames it, this + /// allows faster copies of the `ZipFile` since there is no need to decompress and compress it again. + /// Any `ZipFile` metadata is copied and not checked, for example the file CRC. + + /// ```no_run + /// use std::fs::File; + /// use std::io::{Read, Seek, Write}; + /// use zip::{ZipArchive, ZipWriter}; + /// + /// fn copy_rename( + /// src: &mut ZipArchive, + /// dst: &mut ZipWriter, + /// ) -> zip::result::ZipResult<()> + /// where + /// R: Read + Seek, + /// W: Write + Seek, + /// { + /// // Retrieve file entry by name + /// let file = src.by_name("src_file.txt")?; + /// + /// // Copy and rename the previously obtained file entry to the destination zip archive + /// dst.raw_copy_file_rename(file, "new_name.txt")?; + /// + /// Ok(()) + /// } + /// ``` + pub fn raw_copy_file_rename(&mut self, mut file: ZipFile, name: S) -> ZipResult<()> + where + S: Into, + { + let options = FileOptions::default() + .last_modified_time(file.last_modified()) + .compression_method(file.compression()); + if let Some(perms) = file.unix_mode() { + options.unix_permissions(perms); + } + + let raw_values = ZipRawValues { + crc32: file.crc32(), + compressed_size: file.compressed_size(), + uncompressed_size: file.size(), + }; + + self.start_entry(name, options, Some(raw_values))?; + self.writing_to_file = true; + + io::copy(file.get_raw_reader(), self)?; + + Ok(()) + } + + /// Add a new file using the already compressed data from a ZIP file being read, this allows faster + /// copies of the `ZipFile` since there is no need to decompress and compress it again. Any `ZipFile` + /// metadata is copied and not checked, for example the file CRC. + /// + /// ```no_run + /// use std::fs::File; + /// use std::io::{Read, Seek, Write}; + /// use zip::{ZipArchive, ZipWriter}; + /// + /// fn copy(src: &mut ZipArchive, dst: &mut ZipWriter) -> zip::result::ZipResult<()> + /// where + /// R: Read + Seek, + /// W: Write + Seek, + /// { + /// // Retrieve file entry by name + /// let file = src.by_name("src_file.txt")?; + /// + /// // Copy the previously obtained file entry to the destination zip archive + /// dst.raw_copy_file(file)?; + /// + /// Ok(()) + /// } + /// ``` + pub fn raw_copy_file(&mut self, file: ZipFile) -> ZipResult<()> { + let name = file.name().to_owned(); + self.raw_copy_file_rename(file, name) + } + /// Add a directory entry. /// /// You can't write data to the file afterwards. @@ -329,7 +435,7 @@ impl ZipWriter { _ => name_as_string + "/", }; - self.start_entry(name_with_slash, options)?; + self.start_entry(name_with_slash, options, None)?; self.writing_to_file = false; Ok(()) } diff --git a/tests/end_to_end.rs b/tests/end_to_end.rs index 6268920a..b826f548 100644 --- a/tests/end_to_end.rs +++ b/tests/end_to_end.rs @@ -1,8 +1,9 @@ use std::collections::HashSet; use std::io::prelude::*; -use std::io::Cursor; +use std::io::{Cursor, Seek}; use std::iter::FromIterator; use zip::write::FileOptions; +use zip::CompressionMethod; // This test asserts that after creating a zip file, then reading its contents back out, // the extracted data will *always* be exactly the same as the original data. @@ -10,49 +11,98 @@ use zip::write::FileOptions; fn end_to_end() { let file = &mut Cursor::new(Vec::new()); - write_to_zip_file(file).expect("file written"); + write_to_zip(file).expect("file written"); - let file_contents: String = read_zip_file(file).unwrap(); - - assert!(file_contents.as_bytes() == LOREM_IPSUM); + check_zip_contents(file, ENTRY_NAME); } -fn write_to_zip_file(file: &mut Cursor>) -> zip::result::ZipResult<()> { +// This test asserts that after copying a `ZipFile` to a new `ZipWriter`, then reading its +// contents back out, the extracted data will *always* be exactly the same as the original data. +#[test] +fn copy() { + let src_file = &mut Cursor::new(Vec::new()); + write_to_zip(src_file).expect("file written"); + + let mut tgt_file = &mut Cursor::new(Vec::new()); + + { + let mut src_archive = zip::ZipArchive::new(src_file).unwrap(); + let mut zip = zip::ZipWriter::new(&mut tgt_file); + + { + let file = src_archive.by_name(ENTRY_NAME).expect("file found"); + zip.raw_copy_file(file).unwrap(); + } + + { + let file = src_archive.by_name(ENTRY_NAME).expect("file found"); + zip.raw_copy_file_rename(file, COPY_ENTRY_NAME).unwrap(); + } + } + + let mut tgt_archive = zip::ZipArchive::new(tgt_file).unwrap(); + + check_zip_file_contents(&mut tgt_archive, ENTRY_NAME); + check_zip_file_contents(&mut tgt_archive, COPY_ENTRY_NAME); +} + +fn write_to_zip(file: &mut Cursor>) -> zip::result::ZipResult<()> { let mut zip = zip::ZipWriter::new(file); zip.add_directory("test/", Default::default())?; let options = FileOptions::default() - .compression_method(zip::CompressionMethod::Stored) + .compression_method(CompressionMethod::Stored) .unix_permissions(0o755); zip.start_file("test/☃.txt", options)?; zip.write_all(b"Hello, World!\n")?; - zip.start_file("test/lorem_ipsum.txt", Default::default())?; + zip.start_file(ENTRY_NAME, Default::default())?; zip.write_all(LOREM_IPSUM)?; zip.finish()?; Ok(()) } -fn read_zip_file(zip_file: &mut Cursor>) -> zip::result::ZipResult { - let mut archive = zip::ZipArchive::new(zip_file).unwrap(); +fn read_zip(zip_file: R) -> zip::result::ZipResult> { + let archive = zip::ZipArchive::new(zip_file).unwrap(); - let expected_file_names = ["test/", "test/☃.txt", "test/lorem_ipsum.txt"]; + let expected_file_names = ["test/", "test/☃.txt", ENTRY_NAME]; let expected_file_names = HashSet::from_iter(expected_file_names.iter().map(|&v| v)); let file_names = archive.file_names().collect::>(); assert_eq!(file_names, expected_file_names); - let mut file = archive.by_name("test/lorem_ipsum.txt")?; + Ok(archive) +} + +fn read_zip_file( + archive: &mut zip::ZipArchive, + name: &str, +) -> zip::result::ZipResult { + let mut file = archive.by_name(name)?; let mut contents = String::new(); file.read_to_string(&mut contents).unwrap(); Ok(contents) } +fn check_zip_contents(zip_file: &mut Cursor>, name: &str) { + let mut archive = read_zip(zip_file).unwrap(); + check_zip_file_contents(&mut archive, name); +} + +fn check_zip_file_contents(archive: &mut zip::ZipArchive, name: &str) { + let file_contents: String = read_zip_file(archive, name).unwrap(); + assert!(file_contents.as_bytes() == LOREM_IPSUM); +} + const LOREM_IPSUM : &'static [u8] = b"Lorem ipsum dolor sit amet, consectetur adipiscing elit. In tellus elit, tristique vitae mattis egestas, ultricies vitae risus. Quisque sit amet quam ut urna aliquet molestie. Proin blandit ornare dui, a tempor nisl accumsan in. Praesent a consequat felis. Morbi metus diam, auctor in auctor vel, feugiat id odio. Curabitur ex ex, dictum quis auctor quis, suscipit id lorem. Aliquam vestibulum dolor nec enim vehicula, porta tristique augue tincidunt. Vivamus ut gravida est. Sed pellentesque, dolor vitae tristique consectetur, neque lectus pulvinar dui, sed feugiat purus diam id lectus. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Maecenas feugiat velit in ex ultrices scelerisque id id neque. "; + +const ENTRY_NAME: &str = "test/lorem_ipsum.txt"; + +const COPY_ENTRY_NAME: &str = "test/lorem_ipsum_renamed.txt"; From 105368aebfcd5e58d31afc5786a3b4bfeed8ad33 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Tue, 10 Nov 2020 16:37:14 +0000 Subject: [PATCH 11/14] docs: improve explanation of new APIs --- examples/extract.rs | 2 +- examples/file_info.rs | 2 +- src/read.rs | 25 ++++++++++--------------- tests/zip64_large.rs | 2 +- tests/zip_crypto.rs | 2 +- 5 files changed, 14 insertions(+), 19 deletions(-) diff --git a/examples/extract.rs b/examples/extract.rs index 8eeee9f6..05c5a4aa 100644 --- a/examples/extract.rs +++ b/examples/extract.rs @@ -18,7 +18,7 @@ fn real_main() -> i32 { for i in 0..archive.len() { let mut file = archive.by_index(i).unwrap(); - let outpath = match file.name_as_child() { + let outpath = match file.enclosed_name() { Some(path) => path.to_owned(), None => continue, }; diff --git a/examples/file_info.rs b/examples/file_info.rs index dd72e776..315b5c38 100644 --- a/examples/file_info.rs +++ b/examples/file_info.rs @@ -19,7 +19,7 @@ fn real_main() -> i32 { for i in 0..archive.len() { let file = archive.by_index(i).unwrap(); - let outpath = match file.name_as_child() { + let outpath = match file.enclosed_name() { Some(path) => path, None => { println!("Entry {} has a suspicious path", file.name()); diff --git a/src/read.rs b/src/read.rs index b25862b5..3d7206a3 100644 --- a/src/read.rs +++ b/src/read.rs @@ -311,28 +311,23 @@ impl ZipArchive { comment: footer.zip_file_comment, }) } - /// Extract a Zip archive into a directory. + /// Extract a Zip archive into a directory, overwriting files if they + /// already exist. Paths are sanitized with [`ZipFile::enclosed_name`]. /// - /// Malformed and malicious paths are rejected so that they cannot escape - /// the given directory. - /// - /// This bails on the first error and does not attempt cleanup. - /// - /// # Platform-specific behaviour - /// - /// On unix systems permissions from the zip file are preserved, if they exist. + /// Extraction is not atomic; If an error is encountered, some of the files + /// may be left on disk. pub fn extract>(&mut self, directory: P) -> ZipResult<()> { use std::fs; for i in 0..self.len() { let mut file = self.by_index(i)?; let filepath = file - .name_as_child() + .enclosed_name() .ok_or(ZipError::InvalidArchive("Invalid file path"))?; let outpath = directory.as_ref().join(filepath); - if (file.name()).ends_with('/') { + if file.name().ends_with('/') { fs::create_dir_all(&outpath)?; } else { if let Some(p) = outpath.parent() { @@ -617,7 +612,7 @@ impl<'a> ZipFile<'a> { /// allows an attacker to craft a ZIP archive that will overwrite critical /// files. /// - /// You can use the [`ZipFile::name_as_child`] method to validate the name + /// You can use the [`ZipFile::enclosed_name`] method to validate the name /// as a safe path. pub fn name(&self) -> &str { &self.data.file_name @@ -650,7 +645,7 @@ impl<'a> ZipFile<'a> { /// This is appropriate if you need to be able to extract *something* from /// any archive, but will easily misrepresent trivial paths like /// `foo/../bar` as `foo/bar` (instead of `bar`). Because of this, - /// [`ZipFile::name_as_child`] is the better option in most scenarios. + /// [`ZipFile::enclosed_name`] is the better option in most scenarios. /// /// [`ParentDir`]: `Component::ParentDir` pub fn mangled_name(&self) -> ::std::path::PathBuf { @@ -667,7 +662,7 @@ impl<'a> ZipFile<'a> { /// This will read well-formed ZIP files correctly, and is resistant /// to path-based exploits. It is recommended over /// [`ZipFile::mangled_name`]. - pub fn name_as_child(&self) -> Option<&Path> { + pub fn enclosed_name(&self) -> Option<&Path> { if self.data.file_name.contains('\0') { return None; } @@ -1010,7 +1005,7 @@ mod test { for i in 0..zip.len() { let zip_file = zip.by_index(i).unwrap(); - let full_name = zip_file.name_as_child().unwrap(); + let full_name = zip_file.enclosed_name().unwrap(); let file_name = full_name.file_name().unwrap().to_str().unwrap(); assert!( (file_name.starts_with("dir") && zip_file.is_dir()) diff --git a/tests/zip64_large.rs b/tests/zip64_large.rs index ae790a54..3d10a318 100644 --- a/tests/zip64_large.rs +++ b/tests/zip64_large.rs @@ -195,7 +195,7 @@ fn zip64_large() { for i in 0..archive.len() { let mut file = archive.by_index(i).unwrap(); - let outpath = file.name_as_child().unwrap(); + let outpath = file.enclosed_name().unwrap(); println!( "Entry {} has name \"{}\" ({} bytes)", i, diff --git a/tests/zip_crypto.rs b/tests/zip_crypto.rs index 26626495..cae6b1f3 100644 --- a/tests/zip_crypto.rs +++ b/tests/zip_crypto.rs @@ -75,7 +75,7 @@ fn encrypted_file() { .by_index_decrypt(0, "test".as_bytes()) .unwrap() .unwrap(); - let file_name = file.name_as_child().unwrap(); + let file_name = file.enclosed_name().unwrap(); assert_eq!(file_name, std::path::PathBuf::from("test.txt")); let mut data = Vec::new(); From b9f2d9419a9c6248178e09687704b7671628017a Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Tue, 10 Nov 2020 17:36:42 +0000 Subject: [PATCH 12/14] docs: add github actions to readme --- README.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/README.md b/README.md index 9a062c57..8d344c7d 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,7 @@ zip-rs ====== -[![Build Status](https://travis-ci.org/mvdnes/zip-rs.svg?branch=master)](https://travis-ci.org/mvdnes/zip-rs) -[![Build status](https://ci.appveyor.com/api/projects/status/gsnpqcodg19iu253/branch/master?svg=true)](https://ci.appveyor.com/project/mvdnes/zip-rs/branch/master) +[![Build Status](https://img.shields.io/github/workflow/status/zip-rs/zip/CI)](https://github.com/zip-rs/zip/actions?query=branch%3Amaster+workflow%3ACI) [![Crates.io version](https://img.shields.io/crates/v/zip.svg)](https://crates.io/crates/zip) [Documentation](http://mvdnes.github.io/rust-docs/zip-rs/zip/index.html) From b20ada442706328293f4262b951fa9ee0f2926d2 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Tue, 10 Nov 2020 17:12:27 +0000 Subject: [PATCH 13/14] feat: provide constants for compression methods --- src/compression.rs | 51 ++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 43 insertions(+), 8 deletions(-) diff --git a/src/compression.rs b/src/compression.rs index 3183e851..6f91e9f0 100644 --- a/src/compression.rs +++ b/src/compression.rs @@ -10,7 +10,7 @@ use std::fmt; /// /// When creating ZIP files, you may choose the method to use with /// [`zip::write::FileOptions::compression_method`] -#[derive(Copy, Clone, PartialEq, Debug)] +#[derive(Copy, Clone, PartialEq, Eq, Debug)] pub enum CompressionMethod { /// Store the file as is Stored, @@ -25,18 +25,53 @@ pub enum CompressionMethod { #[cfg(feature = "bzip2")] Bzip2, /// Unsupported compression method - #[deprecated( - since = "0.5.7", - note = "implementation details are being removed from the public API" - )] + #[deprecated(since = "0.5.7", note = "use the constants instead")] Unsupported(u16), } - +#[allow(deprecated, missing_docs)] +/// All compression methods defined for the ZIP format +impl CompressionMethod { + pub const STORE: Self = Self::Stored; + pub const SHRINK: Self = Self::Unsupported(1); + pub const REDUCE_1: Self = Self::Unsupported(2); + pub const REDUCE_2: Self = Self::Unsupported(3); + pub const REDUCE_3: Self = Self::Unsupported(4); + pub const REDUCE_4: Self = Self::Unsupported(5); + pub const IMPLODE: Self = Self::Unsupported(6); + #[cfg(any( + feature = "deflate", + feature = "deflate-miniz", + feature = "deflate-zlib" + ))] + pub const DEFLATE: Self = Self::Deflated; + #[cfg(not(any( + feature = "deflate", + feature = "deflate-miniz", + feature = "deflate-zlib" + )))] + pub const DEFLATE: Self = Self::Unsupported(8); + pub const DEFLATE64: Self = Self::Unsupported(9); + pub const PKWARE_IMPLODE: Self = Self::Unsupported(10); + #[cfg(feature = "bzip2")] + pub const BZIP2: Self = Self::Bzip2; + #[cfg(not(feature = "bzip2"))] + pub const BZIP2: Self = Self::Unsupported(12); + pub const LZMA: Self = Self::Unsupported(14); + pub const IBM_ZOS_CMPSC: Self = Self::Unsupported(16); + pub const IBM_TERSE: Self = Self::Unsupported(18); + pub const ZSTD_DEPRECATED: Self = Self::Unsupported(20); + pub const ZSTD: Self = Self::Unsupported(93); + pub const MP3: Self = Self::Unsupported(94); + pub const XZ: Self = Self::Unsupported(95); + pub const JPEG: Self = Self::Unsupported(96); + pub const WAVPACK: Self = Self::Unsupported(97); + pub const PPMD: Self = Self::Unsupported(98); +} impl CompressionMethod { /// Converts an u16 to its corresponding CompressionMethod #[deprecated( since = "0.5.7", - note = "implementation details are being removed from the public API" + note = "use a constant to construct a compression method" )] pub fn from_u16(val: u16) -> CompressionMethod { #[allow(deprecated)] @@ -58,7 +93,7 @@ impl CompressionMethod { /// Converts a CompressionMethod to a u16 #[deprecated( since = "0.5.7", - note = "implementation details are being removed from the public API" + note = "to match on other compression methods, use a constant" )] pub fn to_u16(self) -> u16 { #[allow(deprecated)] From ac4f5b3ef5d557ea2d4af56c4536fcdc1e8fae52 Mon Sep 17 00:00:00 2001 From: Marli Frost Date: Tue, 10 Nov 2020 17:32:14 +0000 Subject: [PATCH 14/14] fix: remove enum aliases this feature is unstable on 1.34.0 --- src/compression.rs | 46 +++++++++++++++++++++++----------------------- 1 file changed, 23 insertions(+), 23 deletions(-) diff --git a/src/compression.rs b/src/compression.rs index 6f91e9f0..5fdde070 100644 --- a/src/compression.rs +++ b/src/compression.rs @@ -31,41 +31,41 @@ pub enum CompressionMethod { #[allow(deprecated, missing_docs)] /// All compression methods defined for the ZIP format impl CompressionMethod { - pub const STORE: Self = Self::Stored; - pub const SHRINK: Self = Self::Unsupported(1); - pub const REDUCE_1: Self = Self::Unsupported(2); - pub const REDUCE_2: Self = Self::Unsupported(3); - pub const REDUCE_3: Self = Self::Unsupported(4); - pub const REDUCE_4: Self = Self::Unsupported(5); - pub const IMPLODE: Self = Self::Unsupported(6); + pub const STORE: Self = CompressionMethod::Stored; + pub const SHRINK: Self = CompressionMethod::Unsupported(1); + pub const REDUCE_1: Self = CompressionMethod::Unsupported(2); + pub const REDUCE_2: Self = CompressionMethod::Unsupported(3); + pub const REDUCE_3: Self = CompressionMethod::Unsupported(4); + pub const REDUCE_4: Self = CompressionMethod::Unsupported(5); + pub const IMPLODE: Self = CompressionMethod::Unsupported(6); #[cfg(any( feature = "deflate", feature = "deflate-miniz", feature = "deflate-zlib" ))] - pub const DEFLATE: Self = Self::Deflated; + pub const DEFLATE: Self = CompressionMethod::Deflated; #[cfg(not(any( feature = "deflate", feature = "deflate-miniz", feature = "deflate-zlib" )))] - pub const DEFLATE: Self = Self::Unsupported(8); - pub const DEFLATE64: Self = Self::Unsupported(9); - pub const PKWARE_IMPLODE: Self = Self::Unsupported(10); + pub const DEFLATE: Self = CompressionMethod::Unsupported(8); + pub const DEFLATE64: Self = CompressionMethod::Unsupported(9); + pub const PKWARE_IMPLODE: Self = CompressionMethod::Unsupported(10); #[cfg(feature = "bzip2")] - pub const BZIP2: Self = Self::Bzip2; + pub const BZIP2: Self = CompressionMethod::Bzip2; #[cfg(not(feature = "bzip2"))] - pub const BZIP2: Self = Self::Unsupported(12); - pub const LZMA: Self = Self::Unsupported(14); - pub const IBM_ZOS_CMPSC: Self = Self::Unsupported(16); - pub const IBM_TERSE: Self = Self::Unsupported(18); - pub const ZSTD_DEPRECATED: Self = Self::Unsupported(20); - pub const ZSTD: Self = Self::Unsupported(93); - pub const MP3: Self = Self::Unsupported(94); - pub const XZ: Self = Self::Unsupported(95); - pub const JPEG: Self = Self::Unsupported(96); - pub const WAVPACK: Self = Self::Unsupported(97); - pub const PPMD: Self = Self::Unsupported(98); + pub const BZIP2: Self = CompressionMethod::Unsupported(12); + pub const LZMA: Self = CompressionMethod::Unsupported(14); + pub const IBM_ZOS_CMPSC: Self = CompressionMethod::Unsupported(16); + pub const IBM_TERSE: Self = CompressionMethod::Unsupported(18); + pub const ZSTD_DEPRECATED: Self = CompressionMethod::Unsupported(20); + pub const ZSTD: Self = CompressionMethod::Unsupported(93); + pub const MP3: Self = CompressionMethod::Unsupported(94); + pub const XZ: Self = CompressionMethod::Unsupported(95); + pub const JPEG: Self = CompressionMethod::Unsupported(96); + pub const WAVPACK: Self = CompressionMethod::Unsupported(97); + pub const PPMD: Self = CompressionMethod::Unsupported(98); } impl CompressionMethod { /// Converts an u16 to its corresponding CompressionMethod