Commit graph

708 commits

Author SHA1 Message Date
Alexander Zaitsev
0dcc40bee0
Merge pull request #336 from jkasari/sizeDocs
Add units to the size documentation
2023-01-20 06:04:59 +03:00
jkasari
7b83591f26 Add units to the size documentation.
The documentation did not list what it meant by "size". I changed it to
specify that it is returning the size in bytes.
2023-01-19 18:55:42 -08:00
Plecra
f6357c5993
Merge pull request #322 from wyatt-herkamp/master
Clippy Warnings Patch
2022-11-14 18:15:25 +00:00
Wyatt Herkamp
efd7f934ca Merge remote-tracking branch 'origin/master'
# Conflicts:
#	src/read.rs
2022-10-13 07:53:55 -04:00
Wyatt Herkamp
1c5cd4ffda Fixed new Clippy Warnings 2022-10-13 07:51:02 -04:00
Wyatt Herkamp
2b9efe97ba Fixed new Clippy Warnings 2022-10-13 07:44:26 -04:00
Wyatt Herkamp
d59adf0990 Fixed new Clippy Warnings 2022-10-13 07:44:25 -04:00
Wyatt Herkamp
24caeaac27 Make github ci use 1.59 for time depend and fix two clippy warnings 2022-10-13 07:44:21 -04:00
Wyatt Herkamp
f4bbaf8434 hopefully a depend fix 2022-10-13 07:44:21 -04:00
Alexander Zaitsev
5737927dbb
Merge pull request #317 from NobodyXu/optimize
Optimize `ZipArchive::extract`
2022-10-13 13:26:24 +03:00
Alexander Zaitsev
1774bb872b
doc: update README
- bump MSRV
2022-10-13 13:03:08 +03:00
Alexander Zaitsev
a06b947ec5
feat: bump MSRV
- bump MSRV in CI
2022-10-13 13:02:31 +03:00
Alexander Zaitsev
ecbd2ce5c2 feat(release): prepare to 0.6.3 release
- update library version
- update README

Tested:
- No
2022-10-13 11:53:17 +02:00
Wyatt Herkamp
e2ff935aaf Fixed new Clippy Warnings 2022-10-07 13:20:50 -04:00
Wyatt Herkamp
89e84e1032 Fixed new Clippy Warnings 2022-09-27 13:30:55 -04:00
Wyatt Herkamp
13084ef732 Make github ci use 1.59 for time depend and fix two clippy warnings 2022-09-12 18:53:15 -04:00
Wyatt Herkamp
3622e8f682 hopefully a depend fix 2022-09-12 10:26:39 -04:00
Jiahao XU
80005fd2e1
Optimize inner of ZipArchive::extract
Rm generics in `inner`

Signed-off-by: Jiahao XU <Jiahao_XU@outlook.com>
2022-07-20 23:54:04 +10:00
Jiahao XU
6402eb0d22
Avoid dup monomorphization in ZipArchive::extract
Signed-off-by: Jiahao XU <Jiahao_XU@outlook.com>
2022-07-20 23:50:34 +10:00
Jiahao XU
199796cbbf
Rm unnecessary p.exist() in ZipArchive::extract
Signed-off-by: Jiahao XU <Jiahao_XU@outlook.com>
2022-07-20 23:48:48 +10:00
Alexander Zaitsev
bb230ef56a
Merge pull request #311 from striezel/dependency-updates
chore: update dependencies (pbkdf2 0.11.0, flate2 1.0.23)
2022-05-03 20:52:52 +03:00
Dirk Stolle
c65092c7c9 chore: update dependencies (pbkdf2 0.11.0, flate2 1.0.23) 2022-05-01 19:20:46 +02:00
Alexander Zaitsev
93ecab8cd6
Merge pull request #309 from striezel/fix-typos
Fix a few typos
2022-05-01 15:14:10 +03:00
Alexander Zaitsev
38d920dab9
Merge pull request #310 from striezel/update-msrv-to-1.57
bump MSRV to 1.57
2022-05-01 15:13:16 +03:00
Dirk Stolle
e78a51bdd5 bump MSRV to 1.57 2022-05-01 00:48:56 +02:00
Dirk Stolle
e3d8f47708 Fix a few typos 2022-05-01 00:39:24 +02:00
Alexander Zaitsev
87d7b31f5e
Merge pull request #307 from nickbabcock/fuzz
Add read fuzzing module
2022-04-26 11:53:10 +03:00
Alexander Zaitsev
5b0d86d65e
Merge pull request #308 from nickbabcock/fixes-
Fix capacity overflow on invalid zips reads
2022-04-26 11:52:29 +03:00
Nick Babcock
03613cb56e Fix capacity overflow on invalid zips reads
Preemptively allocating structures with the number of reported files can
lead to trouble as an invalid zip can still have a valid central
directory end that is fed into a `with_capacity` causing it to overflow.

This commit introduces a heuristic that will use the reported number of
files as long as the number is less than the cde offset.

Benchmarks were unaffected by this change.
2022-04-25 21:01:56 -05:00
Nick Babcock
b7966a8538 Add read fuzzing module
As someone who has personal projects that take untrusted zips as input,
it is important to me to be able to fuzz the zip project to simulate
possible inputs and to ensure the projects are not vulnerable.

This commit adds a cargo fuzz module for reading and extracting input.

The `fuzz` directory was scaffolded with a `cargo fuzz init`

I added a CI step to guard against the fuzz module decaying over time.
2022-04-25 20:08:53 -05:00
Alexander Zaitsev
7f424a7ffe
Merge pull request #304 from indygreg/symlink-writing
Implement support for writing symlinks
2022-04-12 23:42:43 +03:00
Gregory Szorc
46c2ae88d4 Implement support for writing symlinks
The primary goal of this commit is to enable this library to emit
zip archives with symlinks while minimizing the surface area of the
change to hopefully enable the PR to merge with minimal controversy.

Today, it isn't possible to write symlinks with this library because
there's no way to preserve the upper S_IFMT bits in the file mode
bits because:

* There's no way to set FileOptions.permissions with the S_IFLNK bits
  set (FileOptions.unix_permissions() throws away bits beyond 0o777).
* Existing APIs for starting a "typed" (e.g. file or directory) entry
  automatically set the S_IFMT bits and could conflict with bits
  set on FileOptions.permissions.
* The low-level, generic start_entry() function isn't public.

When implementing this, I initially added a `FileOptions.unix_mode()`
function to allow setting all 16 bits in the eventual external
attributes u32. However, I quickly realized this wouldn't be enough
because APIs like start_file() do things like `|= 0o100000`. So if
we went this route, we'd need to make consumers of
FileOptions.permissions aware of when they should or shouldn't touch
the high bits beyond 0o777.

I briefly thought about making FileOptions.permissions an enum with
a variant to allow the st_mode bits to sail through unmodified. But
this change seemed overly invasive, low level, and not very
user-friendly.

So the approach I decided on was to define a new add_symlink() API.
It follows the pattern of add_directory() and provides an easy-to-use
and opionated API around the addition of a special file type.

I purposefully chose to not implement reading or extraction support
for symlinks because a) I don't need the feature at the moment
b) implementing symlink extraction in a way that works reliably on all
platforms and doesn't have security issues is hard. I figured it was
best to limit the scope of this change so this PR stands a good chance
of being merged.

Partially implements #77.
2022-04-12 10:58:24 -07:00
Alexander Zaitsev
cf9e347031
Merge pull request #303 from PJB3005/22-04-11-list-capacity
Use some ::with_capacity when reading zip file.
2022-04-11 17:23:47 +03:00
Pieter-Jan Briers
621971f078 Use some ::with_capacity when reading zip file.
Now with a proper benchmark
2022-04-11 16:17:20 +02:00
Alexander Zaitsev
679f0fdb08
Merge pull request #302 from PJB3005/22-04-11-improve-seek
Use Seek.stream_position instead of seek(0).
2022-04-11 15:49:41 +03:00
Pieter-Jan Briers
6b5628bef4 Use Seek.stream_position instead of seek(0).
BufReader can cache the result of stream_position() so it's fast, whereas seek(0) discards the read buffer and passes through straight to the OS. This drastically worsens the efficiency of loading performance when using BufReader (or anything else to avoid all these tiny reads going straight to the kernel).
2022-04-11 14:30:27 +02:00
Alexander Zaitsev
d82ccd0513
Merge pull request #300 from khuey/zstd_11
Bump zstd to 0.11.
2022-04-06 11:00:28 +03:00
Kyle Huey
e7d309288c Bump zstd to 0.11. 2022-04-05 15:45:26 -07:00
Alexander Zaitsev
4f7609cec7
Merge pull request #298 from zip-rs/feature/prepare_release_0.6.2
feat: prepare 0.6.2 release
2022-04-02 17:38:43 +03:00
Alexander Zaitsev
635f6b9b72
feat: prepare 0.6.2 release
- update the version number in Cargo
- update the README file

Tested:
- No
2022-04-02 17:34:07 +03:00
Alexander Zaitsev
2c4572dd52
Merge pull request #296 from messense/arm32
Fix build for armv5te target
2022-04-02 13:07:51 +03:00
messense
2d0d1d2990
Fix build for armv5te target 2022-04-02 10:37:36 +08:00
Alexander Zaitsev
172f60fb9a
Merge pull request #294 from zip-rs/feature/prepare_release_0.6.1
feat: prepare 0.6.1 release
2022-04-01 00:58:57 +03:00
Alexander Zaitsev
23771411dc
feat: prepare 0.6.1 release
- update the version number in Cargo
- update the README file

Tested:
- No
2022-04-01 00:43:51 +03:00
Alexander Zaitsev
d00ad632a1
Merge pull request #293 from qu1x/fix-no-default-features
Fix build with `--no-default-features`.
2022-03-28 13:10:29 +03:00
Rouven Spreckels
9a32d129ff Fix build with --no-default-features. 2022-03-28 11:43:25 +02:00
Alexander Zaitsev
77294fd3ce
Revert "Merge pull request #290 from aweinstock314/more-spec-structs"
This reverts commit a1da6860ea, reversing
changes made to 574bb3df17.
2022-03-26 14:13:50 +03:00
Alexander Zaitsev
a1da6860ea
Merge pull request #290 from aweinstock314/more-spec-structs
Add `zip::spec::{CentralDirectoryHeader, DataDescriptor, LocalFileHea…
2022-03-26 02:13:28 +03:00
Alexander Zaitsev
574bb3df17
Merge pull request #289 from zip-rs/issue/281
docs: add a note about password handling
2022-03-26 00:44:45 +03:00
Alexander Zaitsev
d8cfb2fd81
Merge branch 'master' into issue/281 2022-03-26 00:38:59 +03:00