summaryrefslogtreecommitdiffstats
path: root/vendor/tar
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/tar')
-rw-r--r--vendor/tar/.cargo-checksum.json1
-rw-r--r--vendor/tar/Cargo.lock201
-rw-r--r--vendor/tar/Cargo.toml49
-rw-r--r--vendor/tar/LICENSE-APACHE201
-rw-r--r--vendor/tar/LICENSE-MIT25
-rw-r--r--vendor/tar/README.md76
-rw-r--r--vendor/tar/debian/patches/disable-tests.diff190
-rw-r--r--vendor/tar/debian/patches/series2
-rw-r--r--vendor/tar/debian/patches/test-skip-loop0-if-nonexistent.diff17
-rw-r--r--vendor/tar/examples/extract_file.rs25
-rw-r--r--vendor/tar/examples/list.rs17
-rw-r--r--vendor/tar/examples/raw_list.rs48
-rw-r--r--vendor/tar/examples/write.rs13
-rw-r--r--vendor/tar/src/archive.rs615
-rw-r--r--vendor/tar/src/builder.rs663
-rw-r--r--vendor/tar/src/entry.rs972
-rw-r--r--vendor/tar/src/entry_type.rs193
-rw-r--r--vendor/tar/src/error.rs41
-rw-r--r--vendor/tar/src/header.rs1642
-rw-r--r--vendor/tar/src/lib.rs44
-rw-r--r--vendor/tar/src/pax.rs147
-rw-r--r--vendor/tar/tests/all.rs1525
-rw-r--r--vendor/tar/tests/entry.rs410
-rw-r--r--vendor/tar/tests/header/mod.rs246
24 files changed, 7363 insertions, 0 deletions
diff --git a/vendor/tar/.cargo-checksum.json b/vendor/tar/.cargo-checksum.json
new file mode 100644
index 0000000..90c186c
--- /dev/null
+++ b/vendor/tar/.cargo-checksum.json
@@ -0,0 +1 @@
+{"files":{},"package":"b16afcea1f22891c49a00c751c7b63b2233284064f11a200fc624137c51e2ddb"} \ No newline at end of file
diff --git a/vendor/tar/Cargo.lock b/vendor/tar/Cargo.lock
new file mode 100644
index 0000000..3c19701
--- /dev/null
+++ b/vendor/tar/Cargo.lock
@@ -0,0 +1,201 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+version = 3
+
+[[package]]
+name = "bitflags"
+version = "1.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a"
+
+[[package]]
+name = "bitflags"
+version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "630be753d4e58660abd17930c71b647fe46c27ea6b63cc59e1e3851406972e42"
+
+[[package]]
+name = "cc"
+version = "1.0.82"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "305fe645edc1442a0fa8b6726ba61d422798d37a52e12eaecf4b022ebbb88f01"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "cfg-if"
+version = "1.0.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd"
+
+[[package]]
+name = "errno"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6b30f669a7961ef1631673d2766cc92f52d64f7ef354d4fe0ddfd30ed52f0f4f"
+dependencies = [
+ "errno-dragonfly",
+ "libc",
+ "windows-sys",
+]
+
+[[package]]
+name = "errno-dragonfly"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "aa68f1b12764fab894d2755d2518754e71b4fd80ecfb822714a1206c2aab39bf"
+dependencies = [
+ "cc",
+ "libc",
+]
+
+[[package]]
+name = "fastrand"
+version = "2.0.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6999dc1837253364c2ebb0704ba97994bd874e8f195d665c50b7548f6ea92764"
+
+[[package]]
+name = "filetime"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d4029edd3e734da6fe05b6cd7bd2960760a616bd2ddd0d59a0124746d6272af0"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "redox_syscall",
+ "windows-sys",
+]
+
+[[package]]
+name = "libc"
+version = "0.2.147"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b4668fb0ea861c1df094127ac5f1da3409a82116a4ba74fca2e58ef927159bb3"
+
+[[package]]
+name = "linux-raw-sys"
+version = "0.4.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "57bcfdad1b858c2db7c38303a6d2ad4dfaf5eb53dfeb0910128b2c26d6158503"
+
+[[package]]
+name = "redox_syscall"
+version = "0.3.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "567664f262709473930a4bf9e51bf2ebf3348f2e748ccc50dea20646858f8f29"
+dependencies = [
+ "bitflags 1.3.2",
+]
+
+[[package]]
+name = "rustix"
+version = "0.38.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "172891ebdceb05aa0005f533a6cbfca599ddd7d966f6f5d4d9b2e70478e70399"
+dependencies = [
+ "bitflags 2.3.3",
+ "errno",
+ "libc",
+ "linux-raw-sys",
+ "windows-sys",
+]
+
+[[package]]
+name = "tar"
+version = "0.4.40"
+dependencies = [
+ "filetime",
+ "libc",
+ "tempfile",
+ "xattr",
+]
+
+[[package]]
+name = "tempfile"
+version = "3.7.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dc02fddf48964c42031a0b3fe0428320ecf3a73c401040fc0096f97794310651"
+dependencies = [
+ "cfg-if",
+ "fastrand",
+ "redox_syscall",
+ "rustix",
+ "windows-sys",
+]
+
+[[package]]
+name = "windows-sys"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "677d2418bec65e3338edb076e806bc1ec15693c5d0104683f2efe857f61056a9"
+dependencies = [
+ "windows-targets",
+]
+
+[[package]]
+name = "windows-targets"
+version = "0.48.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "05d4b17490f70499f20b9e791dcf6a299785ce8af4d709018206dc5b4953e95f"
+dependencies = [
+ "windows_aarch64_gnullvm",
+ "windows_aarch64_msvc",
+ "windows_i686_gnu",
+ "windows_i686_msvc",
+ "windows_x86_64_gnu",
+ "windows_x86_64_gnullvm",
+ "windows_x86_64_msvc",
+]
+
+[[package]]
+name = "windows_aarch64_gnullvm"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "91ae572e1b79dba883e0d315474df7305d12f569b400fcf90581b06062f7e1bc"
+
+[[package]]
+name = "windows_aarch64_msvc"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b2ef27e0d7bdfcfc7b868b317c1d32c641a6fe4629c171b8928c7b08d98d7cf3"
+
+[[package]]
+name = "windows_i686_gnu"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "622a1962a7db830d6fd0a69683c80a18fda201879f0f447f065a3b7467daa241"
+
+[[package]]
+name = "windows_i686_msvc"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4542c6e364ce21bf45d69fdd2a8e455fa38d316158cfd43b3ac1c5b1b19f8e00"
+
+[[package]]
+name = "windows_x86_64_gnu"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca2b8a661f7628cbd23440e50b05d705db3686f894fc9580820623656af974b1"
+
+[[package]]
+name = "windows_x86_64_gnullvm"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7896dbc1f41e08872e9d5e8f8baa8fdd2677f29468c4e156210174edc7f7b953"
+
+[[package]]
+name = "windows_x86_64_msvc"
+version = "0.48.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1a515f5799fe4961cb532f983ce2b23082366b898e52ffbce459c86f67c8378a"
+
+[[package]]
+name = "xattr"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f4686009f71ff3e5c4dbcf1a282d0a44db3f021ba69350cd42086b3e5f1c6985"
+dependencies = [
+ "libc",
+]
diff --git a/vendor/tar/Cargo.toml b/vendor/tar/Cargo.toml
new file mode 100644
index 0000000..3fe607f
--- /dev/null
+++ b/vendor/tar/Cargo.toml
@@ -0,0 +1,49 @@
+# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
+#
+# When uploading crates to the registry Cargo will automatically
+# "normalize" Cargo.toml files for maximal compatibility
+# with all versions of Cargo and also rewrite `path` dependencies
+# to registry (e.g., crates.io) dependencies.
+#
+# If you are reading this file be aware that the original Cargo.toml
+# will likely look very different (and much more reasonable).
+# See Cargo.toml.orig for the original contents.
+
+[package]
+edition = "2018"
+name = "tar"
+version = "0.4.40"
+authors = ["Alex Crichton <alex@alexcrichton.com>"]
+exclude = ["tests/archives/*"]
+description = """
+A Rust implementation of a TAR file reader and writer. This library does not
+currently handle compression, but it is abstract over all I/O readers and
+writers. Additionally, great lengths are taken to ensure that the entire
+contents are never required to be entirely resident in memory all at once.
+"""
+homepage = "https://github.com/alexcrichton/tar-rs"
+documentation = "https://docs.rs/tar"
+readme = "README.md"
+keywords = [
+ "tar",
+ "tarfile",
+ "encoding",
+]
+license = "MIT/Apache-2.0"
+repository = "https://github.com/alexcrichton/tar-rs"
+
+[dependencies.filetime]
+version = "0.2.8"
+
+[dev-dependencies.tempfile]
+version = "3"
+
+[features]
+default = ["xattr"]
+
+[target."cfg(unix)".dependencies.libc]
+version = "0.2"
+
+[target."cfg(unix)".dependencies.xattr]
+version = "1.0"
+optional = true
diff --git a/vendor/tar/LICENSE-APACHE b/vendor/tar/LICENSE-APACHE
new file mode 100644
index 0000000..16fe87b
--- /dev/null
+++ b/vendor/tar/LICENSE-APACHE
@@ -0,0 +1,201 @@
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+END OF TERMS AND CONDITIONS
+
+APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
diff --git a/vendor/tar/LICENSE-MIT b/vendor/tar/LICENSE-MIT
new file mode 100644
index 0000000..39e0ed6
--- /dev/null
+++ b/vendor/tar/LICENSE-MIT
@@ -0,0 +1,25 @@
+Copyright (c) 2014 Alex Crichton
+
+Permission is hereby granted, free of charge, to any
+person obtaining a copy of this software and associated
+documentation files (the "Software"), to deal in the
+Software without restriction, including without
+limitation the rights to use, copy, modify, merge,
+publish, distribute, sublicense, and/or sell copies of
+the Software, and to permit persons to whom the Software
+is furnished to do so, subject to the following
+conditions:
+
+The above copyright notice and this permission notice
+shall be included in all copies or substantial portions
+of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF
+ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
+TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
+PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
+SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
+CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR
+IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
+DEALINGS IN THE SOFTWARE.
diff --git a/vendor/tar/README.md b/vendor/tar/README.md
new file mode 100644
index 0000000..25291e8
--- /dev/null
+++ b/vendor/tar/README.md
@@ -0,0 +1,76 @@
+# tar-rs
+
+[Documentation](https://docs.rs/tar)
+
+A tar archive reading/writing library for Rust.
+
+```toml
+# Cargo.toml
+[dependencies]
+tar = "0.4"
+```
+
+## Reading an archive
+
+```rust,no_run
+extern crate tar;
+
+use std::io::prelude::*;
+use std::fs::File;
+use tar::Archive;
+
+fn main() {
+ let file = File::open("foo.tar").unwrap();
+ let mut a = Archive::new(file);
+
+ for file in a.entries().unwrap() {
+ // Make sure there wasn't an I/O error
+ let mut file = file.unwrap();
+
+ // Inspect metadata about the file
+ println!("{:?}", file.header().path().unwrap());
+ println!("{}", file.header().size().unwrap());
+
+ // files implement the Read trait
+ let mut s = String::new();
+ file.read_to_string(&mut s).unwrap();
+ println!("{}", s);
+ }
+}
+
+```
+
+## Writing an archive
+
+```rust,no_run
+extern crate tar;
+
+use std::io::prelude::*;
+use std::fs::File;
+use tar::Builder;
+
+fn main() {
+ let file = File::create("foo.tar").unwrap();
+ let mut a = Builder::new(file);
+
+ a.append_path("file1.txt").unwrap();
+ a.append_file("file2.txt", &mut File::open("file3.txt").unwrap()).unwrap();
+}
+```
+
+# License
+
+This project is licensed under either of
+
+ * Apache License, Version 2.0, ([LICENSE-APACHE](LICENSE-APACHE) or
+ http://www.apache.org/licenses/LICENSE-2.0)
+ * MIT license ([LICENSE-MIT](LICENSE-MIT) or
+ http://opensource.org/licenses/MIT)
+
+at your option.
+
+### Contribution
+
+Unless you explicitly state otherwise, any contribution intentionally submitted
+for inclusion in this project by you, as defined in the Apache-2.0 license,
+shall be dual licensed as above, without any additional terms or conditions.
diff --git a/vendor/tar/debian/patches/disable-tests.diff b/vendor/tar/debian/patches/disable-tests.diff
new file mode 100644
index 0000000..4397624
--- /dev/null
+++ b/vendor/tar/debian/patches/disable-tests.diff
@@ -0,0 +1,190 @@
+Description: Disable tests that rely on test tarballs
+ The test tarballs are not included in the crate on crates.io and hence are not
+ included in the Debian package. I figure that it is better to run some of the
+ tests than none of the tests.
+Author: Peter Michael Green <plugwash@debian.org>
+
+--- a/tests/all.rs
++++ b/tests/all.rs
+@@ -23,17 +23,17 @@
+ };
+ }
+
+-macro_rules! tar {
++/*macro_rules! tar {
+ ($e:expr) => {
+ &include_bytes!(concat!("archives/", $e))[..]
+ };
+-}
++}*/
+
+ mod header;
+
+ /// test that we can concatenate the simple.tar archive and extract the same entries twice when we
+ /// use the ignore_zeros option.
+-#[test]
++/*#[test]
+ fn simple_concat() {
+ let bytes = tar!("simple.tar");
+ let mut archive_bytes = Vec::new();
+@@ -76,9 +76,9 @@
+
+ names
+ }
+-}
++}*/
+
+-#[test]
++/*#[test]
+ fn header_impls() {
+ let mut ar = Archive::new(Cursor::new(tar!("simple.tar")));
+ let hn = Header::new_old();
+@@ -91,9 +91,9 @@
+ let h2b = h2.as_bytes();
+ assert!(h1b[..] == h2b[..] && h2b[..] != hnb[..])
+ }
+-}
++}*/
+
+-#[test]
++/*#[test]
+ fn header_impls_missing_last_header() {
+ let mut ar = Archive::new(Cursor::new(tar!("simple_missing_last_header.tar")));
+ let hn = Header::new_old();
+@@ -106,9 +106,9 @@
+ let h2b = h2.as_bytes();
+ assert!(h1b[..] == h2b[..] && h2b[..] != hnb[..])
+ }
+-}
++}*/
+
+-#[test]
++/*#[test]
+ fn reading_files() {
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+@@ -127,7 +127,7 @@
+ assert_eq!(s, "b\nb\nb\nb\nb\nb\nb\nb\nb\nb\nb\n");
+
+ assert!(entries.next().is_none());
+-}
++}*/
+
+ #[test]
+ fn writing_files() {
+@@ -221,7 +221,7 @@
+ assert!(entries.next().is_none());
+ }
+
+-#[test]
++/*#[test]
+ fn reading_entries() {
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+@@ -234,6 +234,7 @@
+ let mut ar = Archive::new(rdr);
+ reading_entries_common(t!(ar.entries_with_seek()));
+ }
++*/
+
+ struct LoggingReader<R> {
+ inner: R,
+@@ -264,6 +265,7 @@
+ }
+ }
+
++/*
+ #[test]
+ fn skipping_entries_with_seek() {
+ let mut reader = LoggingReader::new(Cursor::new(tar!("reading_files.tar")));
+@@ -281,6 +283,7 @@
+ assert!(files == files_seekable);
+ assert!(seekable_reader.read_bytes < reader.read_bytes);
+ }
++*/
+
+ fn check_dirtree(td: &TempDir) {
+ let dir_a = td.path().join("a");
+@@ -291,6 +294,7 @@
+ assert!(fs::metadata(&file_c).map(|m| m.is_file()).unwrap_or(false));
+ }
+
++/*
+ #[test]
+ fn extracting_directories() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+@@ -1077,8 +1081,9 @@
+ assert!(s[0x2fa0 + 6..0x4000].chars().all(|x| x == '\u{0}'));
+
+ assert!(entries.next().is_none());
+-}
++}*/
+
++/*
+ #[test]
+ fn extract_sparse() {
+ let rdr = Cursor::new(tar!("sparse.tar"));
+@@ -1118,9 +1123,9 @@
+ assert!(s[0x1000 + 6..0x2fa0].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x2fa0..0x2fa0 + 6], "world\n");
+ assert!(s[0x2fa0 + 6..0x4000].chars().all(|x| x == '\u{0}'));
+-}
++}*/
+
+-#[test]
++/*#[test]
+ fn sparse_with_trailing() {
+ let rdr = Cursor::new(tar!("sparse-1.tar"));
+ let mut ar = Archive::new(rdr);
+@@ -1132,7 +1137,7 @@
+ assert_eq!(&s[..0xc], "0MB through\n");
+ assert!(s[0xc..0x100_000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x100_000..], "1MB through\n");
+-}
++}*/
+
+ #[test]
+ fn path_separators() {
+@@ -1302,15 +1307,15 @@
+ ar.finish().unwrap();
+ }
+
+-#[test]
++/*#[test]
+ fn long_path() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("7z_long_path.tar"));
+ let mut ar = Archive::new(rdr);
+ assert!(ar.unpack(td.path()).is_ok());
+-}
++}*/
+
+-#[test]
++/*#[test]
+ fn unpack_path_larger_than_windows_max_path() {
+ let dir_name = "iamaprettylongnameandtobepreciseiam91characterslongwhichsomethinkisreallylongandothersdonot";
+ // 183 character directory name
+@@ -1321,7 +1326,7 @@
+ let mut ar = Archive::new(rdr);
+ // should unpack path greater than windows MAX_PATH length of 260 characters
+ assert!(ar.unpack(td.path()).is_ok());
+-}
++}*/
+
+ #[test]
+ fn append_long_multibyte() {
+@@ -1489,7 +1494,7 @@
+ }
+ }
+
+-#[test]
++/*#[test]
+ #[cfg(unix)]
+ fn pax_and_gnu_uid_gid() {
+ let tarlist = [tar!("biguid_gnu.tar"), tar!("biguid_pax.tar")];
+@@ -1514,4 +1519,4 @@
+ assert!(ar.unpack(td.path()).is_err());
+ }
+ }
+-}
++}*/
diff --git a/vendor/tar/debian/patches/series b/vendor/tar/debian/patches/series
new file mode 100644
index 0000000..36ab50d
--- /dev/null
+++ b/vendor/tar/debian/patches/series
@@ -0,0 +1,2 @@
+disable-tests.diff
+test-skip-loop0-if-nonexistent.diff
diff --git a/vendor/tar/debian/patches/test-skip-loop0-if-nonexistent.diff b/vendor/tar/debian/patches/test-skip-loop0-if-nonexistent.diff
new file mode 100644
index 0000000..1f4eec4
--- /dev/null
+++ b/vendor/tar/debian/patches/test-skip-loop0-if-nonexistent.diff
@@ -0,0 +1,17 @@
+Description: Skip using loop0 if it doesn't exist (apparently it doesn't on Debian CI)
+Author: Peter Michael Green <plugwash@debian.org>
+
+--- a/tests/all.rs
++++ b/tests/all.rs
+@@ -1394,7 +1394,10 @@
+ // unfortunately, block device file cannot be created by non-root users
+ // as a substitute, just test the file that exists on most Unix systems
+ t!(env::set_current_dir("/dev/"));
+- t!(ar.append_path("loop0"));
++ // debian CI apprently doesn't have loop0, skip testing it if it doesn't exist.
++ if std::path::Path::new("loop0").exists() {
++ t!(ar.append_path("loop0"));
++ }
+ // CI systems seem to have issues with creating a chr device
+ t!(ar.append_path("null"));
+ t!(ar.finish());
diff --git a/vendor/tar/examples/extract_file.rs b/vendor/tar/examples/extract_file.rs
new file mode 100644
index 0000000..425e9a3
--- /dev/null
+++ b/vendor/tar/examples/extract_file.rs
@@ -0,0 +1,25 @@
+//! An example of extracting a file in an archive.
+//!
+//! Takes a tarball on standard input, looks for an entry with a listed file
+//! name as the first argument provided, and then prints the contents of that
+//! file to stdout.
+
+extern crate tar;
+
+use std::env::args_os;
+use std::io::{copy, stdin, stdout};
+use std::path::Path;
+
+use tar::Archive;
+
+fn main() {
+ let first_arg = args_os().skip(1).next().unwrap();
+ let filename = Path::new(&first_arg);
+ let mut ar = Archive::new(stdin());
+ for file in ar.entries().unwrap() {
+ let mut f = file.unwrap();
+ if f.path().unwrap() == filename {
+ copy(&mut f, &mut stdout()).unwrap();
+ }
+ }
+}
diff --git a/vendor/tar/examples/list.rs b/vendor/tar/examples/list.rs
new file mode 100644
index 0000000..e2d58da
--- /dev/null
+++ b/vendor/tar/examples/list.rs
@@ -0,0 +1,17 @@
+//! An example of listing the file names of entries in an archive.
+//!
+//! Takes a tarball on stdin and prints out all of the entries inside.
+
+extern crate tar;
+
+use std::io::stdin;
+
+use tar::Archive;
+
+fn main() {
+ let mut ar = Archive::new(stdin());
+ for file in ar.entries().unwrap() {
+ let f = file.unwrap();
+ println!("{}", f.path().unwrap().display());
+ }
+}
diff --git a/vendor/tar/examples/raw_list.rs b/vendor/tar/examples/raw_list.rs
new file mode 100644
index 0000000..9b86da2
--- /dev/null
+++ b/vendor/tar/examples/raw_list.rs
@@ -0,0 +1,48 @@
+//! An example of listing raw entries in an archive.
+//!
+//! Takes a tarball on stdin and prints out all of the entries inside.
+
+extern crate tar;
+
+use std::io::stdin;
+
+use tar::Archive;
+
+fn main() {
+ let mut ar = Archive::new(stdin());
+ for (i, file) in ar.entries().unwrap().raw(true).enumerate() {
+ println!("-------------------------- Entry {}", i);
+ let mut f = file.unwrap();
+ println!("path: {}", f.path().unwrap().display());
+ println!("size: {}", f.header().size().unwrap());
+ println!("entry size: {}", f.header().entry_size().unwrap());
+ println!("link name: {:?}", f.link_name().unwrap());
+ println!("file type: {:#x}", f.header().entry_type().as_byte());
+ println!("mode: {:#o}", f.header().mode().unwrap());
+ println!("uid: {}", f.header().uid().unwrap());
+ println!("gid: {}", f.header().gid().unwrap());
+ println!("mtime: {}", f.header().mtime().unwrap());
+ println!("username: {:?}", f.header().username().unwrap());
+ println!("groupname: {:?}", f.header().groupname().unwrap());
+
+ if f.header().as_ustar().is_some() {
+ println!("kind: UStar");
+ } else if f.header().as_gnu().is_some() {
+ println!("kind: GNU");
+ } else {
+ println!("kind: normal");
+ }
+
+ if let Ok(Some(extensions)) = f.pax_extensions() {
+ println!("pax extensions:");
+ for e in extensions {
+ let e = e.unwrap();
+ println!(
+ "\t{:?} = {:?}",
+ String::from_utf8_lossy(e.key_bytes()),
+ String::from_utf8_lossy(e.value_bytes())
+ );
+ }
+ }
+ }
+}
diff --git a/vendor/tar/examples/write.rs b/vendor/tar/examples/write.rs
new file mode 100644
index 0000000..167263d
--- /dev/null
+++ b/vendor/tar/examples/write.rs
@@ -0,0 +1,13 @@
+extern crate tar;
+
+use std::fs::File;
+use tar::Builder;
+
+fn main() {
+ let file = File::create("foo.tar").unwrap();
+ let mut a = Builder::new(file);
+
+ a.append_path("README.md").unwrap();
+ a.append_file("lib.rs", &mut File::open("src/lib.rs").unwrap())
+ .unwrap();
+}
diff --git a/vendor/tar/src/archive.rs b/vendor/tar/src/archive.rs
new file mode 100644
index 0000000..760b2cb
--- /dev/null
+++ b/vendor/tar/src/archive.rs
@@ -0,0 +1,615 @@
+use std::cell::{Cell, RefCell};
+use std::cmp;
+use std::convert::TryFrom;
+use std::fs;
+use std::io::prelude::*;
+use std::io::{self, SeekFrom};
+use std::marker;
+use std::path::Path;
+
+use crate::entry::{EntryFields, EntryIo};
+use crate::error::TarError;
+use crate::other;
+use crate::pax::*;
+use crate::{Entry, GnuExtSparseHeader, GnuSparseHeader, Header};
+
+/// A top-level representation of an archive file.
+///
+/// This archive can have an entry added to it and it can be iterated over.
+pub struct Archive<R: ?Sized + Read> {
+ inner: ArchiveInner<R>,
+}
+
+pub struct ArchiveInner<R: ?Sized> {
+ pos: Cell<u64>,
+ mask: u32,
+ unpack_xattrs: bool,
+ preserve_permissions: bool,
+ preserve_ownerships: bool,
+ preserve_mtime: bool,
+ overwrite: bool,
+ ignore_zeros: bool,
+ obj: RefCell<R>,
+}
+
+/// An iterator over the entries of an archive.
+pub struct Entries<'a, R: 'a + Read> {
+ fields: EntriesFields<'a>,
+ _ignored: marker::PhantomData<&'a Archive<R>>,
+}
+
+trait SeekRead: Read + Seek {}
+impl<R: Read + Seek> SeekRead for R {}
+
+struct EntriesFields<'a> {
+ archive: &'a Archive<dyn Read + 'a>,
+ seekable_archive: Option<&'a Archive<dyn SeekRead + 'a>>,
+ next: u64,
+ done: bool,
+ raw: bool,
+}
+
+impl<R: Read> Archive<R> {
+ /// Create a new archive with the underlying object as the reader.
+ pub fn new(obj: R) -> Archive<R> {
+ Archive {
+ inner: ArchiveInner {
+ mask: u32::MIN,
+ unpack_xattrs: false,
+ preserve_permissions: false,
+ preserve_ownerships: false,
+ preserve_mtime: true,
+ overwrite: true,
+ ignore_zeros: false,
+ obj: RefCell::new(obj),
+ pos: Cell::new(0),
+ },
+ }
+ }
+
+ /// Unwrap this archive, returning the underlying object.
+ pub fn into_inner(self) -> R {
+ self.inner.obj.into_inner()
+ }
+
+ /// Construct an iterator over the entries in this archive.
+ ///
+ /// Note that care must be taken to consider each entry within an archive in
+ /// sequence. If entries are processed out of sequence (from what the
+ /// iterator returns), then the contents read for each entry may be
+ /// corrupted.
+ pub fn entries(&mut self) -> io::Result<Entries<R>> {
+ let me: &mut Archive<dyn Read> = self;
+ me._entries(None).map(|fields| Entries {
+ fields: fields,
+ _ignored: marker::PhantomData,
+ })
+ }
+
+ /// Unpacks the contents tarball into the specified `dst`.
+ ///
+ /// This function will iterate over the entire contents of this tarball,
+ /// extracting each file in turn to the location specified by the entry's
+ /// path name.
+ ///
+ /// This operation is relatively sensitive in that it will not write files
+ /// outside of the path specified by `dst`. Files in the archive which have
+ /// a '..' in their path are skipped during the unpacking process.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use std::fs::File;
+ /// use tar::Archive;
+ ///
+ /// let mut ar = Archive::new(File::open("foo.tar").unwrap());
+ /// ar.unpack("foo").unwrap();
+ /// ```
+ pub fn unpack<P: AsRef<Path>>(&mut self, dst: P) -> io::Result<()> {
+ let me: &mut Archive<dyn Read> = self;
+ me._unpack(dst.as_ref())
+ }
+
+ /// Set the mask of the permission bits when unpacking this entry.
+ ///
+ /// The mask will be inverted when applying against a mode, similar to how
+ /// `umask` works on Unix. In logical notation it looks like:
+ ///
+ /// ```text
+ /// new_mode = old_mode & (~mask)
+ /// ```
+ ///
+ /// The mask is 0 by default and is currently only implemented on Unix.
+ pub fn set_mask(&mut self, mask: u32) {
+ self.inner.mask = mask;
+ }
+
+ /// Indicate whether extended file attributes (xattrs on Unix) are preserved
+ /// when unpacking this archive.
+ ///
+ /// This flag is disabled by default and is currently only implemented on
+ /// Unix using xattr support. This may eventually be implemented for
+ /// Windows, however, if other archive implementations are found which do
+ /// this as well.
+ pub fn set_unpack_xattrs(&mut self, unpack_xattrs: bool) {
+ self.inner.unpack_xattrs = unpack_xattrs;
+ }
+
+ /// Indicate whether extended permissions (like suid on Unix) are preserved
+ /// when unpacking this entry.
+ ///
+ /// This flag is disabled by default and is currently only implemented on
+ /// Unix.
+ pub fn set_preserve_permissions(&mut self, preserve: bool) {
+ self.inner.preserve_permissions = preserve;
+ }
+
+ /// Indicate whether numeric ownership ids (like uid and gid on Unix)
+ /// are preserved when unpacking this entry.
+ ///
+ /// This flag is disabled by default and is currently only implemented on
+ /// Unix.
+ pub fn set_preserve_ownerships(&mut self, preserve: bool) {
+ self.inner.preserve_ownerships = preserve;
+ }
+
+ /// Indicate whether files and symlinks should be overwritten on extraction.
+ pub fn set_overwrite(&mut self, overwrite: bool) {
+ self.inner.overwrite = overwrite;
+ }
+
+ /// Indicate whether access time information is preserved when unpacking
+ /// this entry.
+ ///
+ /// This flag is enabled by default.
+ pub fn set_preserve_mtime(&mut self, preserve: bool) {
+ self.inner.preserve_mtime = preserve;
+ }
+
+ /// Ignore zeroed headers, which would otherwise indicate to the archive that it has no more
+ /// entries.
+ ///
+ /// This can be used in case multiple tar archives have been concatenated together.
+ pub fn set_ignore_zeros(&mut self, ignore_zeros: bool) {
+ self.inner.ignore_zeros = ignore_zeros;
+ }
+}
+
+impl<R: Seek + Read> Archive<R> {
+ /// Construct an iterator over the entries in this archive for a seekable
+ /// reader. Seek will be used to efficiently skip over file contents.
+ ///
+ /// Note that care must be taken to consider each entry within an archive in
+ /// sequence. If entries are processed out of sequence (from what the
+ /// iterator returns), then the contents read for each entry may be
+ /// corrupted.
+ pub fn entries_with_seek(&mut self) -> io::Result<Entries<R>> {
+ let me: &Archive<dyn Read> = self;
+ let me_seekable: &Archive<dyn SeekRead> = self;
+ me._entries(Some(me_seekable)).map(|fields| Entries {
+ fields: fields,
+ _ignored: marker::PhantomData,
+ })
+ }
+}
+
+impl Archive<dyn Read + '_> {
+ fn _entries<'a>(
+ &'a self,
+ seekable_archive: Option<&'a Archive<dyn SeekRead + 'a>>,
+ ) -> io::Result<EntriesFields<'a>> {
+ if self.inner.pos.get() != 0 {
+ return Err(other(
+ "cannot call entries unless archive is at \
+ position 0",
+ ));
+ }
+ Ok(EntriesFields {
+ archive: self,
+ seekable_archive,
+ done: false,
+ next: 0,
+ raw: false,
+ })
+ }
+
+ fn _unpack(&mut self, dst: &Path) -> io::Result<()> {
+ if dst.symlink_metadata().is_err() {
+ fs::create_dir_all(&dst)
+ .map_err(|e| TarError::new(format!("failed to create `{}`", dst.display()), e))?;
+ }
+
+ // Canonicalizing the dst directory will prepend the path with '\\?\'
+ // on windows which will allow windows APIs to treat the path as an
+ // extended-length path with a 32,767 character limit. Otherwise all
+ // unpacked paths over 260 characters will fail on creation with a
+ // NotFound exception.
+ let dst = &dst.canonicalize().unwrap_or(dst.to_path_buf());
+
+ // Delay any directory entries until the end (they will be created if needed by
+ // descendants), to ensure that directory permissions do not interfer with descendant
+ // extraction.
+ let mut directories = Vec::new();
+ for entry in self._entries(None)? {
+ let mut file = entry.map_err(|e| TarError::new("failed to iterate over archive", e))?;
+ if file.header().entry_type() == crate::EntryType::Directory {
+ directories.push(file);
+ } else {
+ file.unpack_in(dst)?;
+ }
+ }
+ for mut dir in directories {
+ dir.unpack_in(dst)?;
+ }
+
+ Ok(())
+ }
+}
+
+impl<'a, R: Read> Entries<'a, R> {
+ /// Indicates whether this iterator will return raw entries or not.
+ ///
+ /// If the raw list of entries are returned, then no preprocessing happens
+ /// on account of this library, for example taking into account GNU long name
+ /// or long link archive members. Raw iteration is disabled by default.
+ pub fn raw(self, raw: bool) -> Entries<'a, R> {
+ Entries {
+ fields: EntriesFields {
+ raw: raw,
+ ..self.fields
+ },
+ _ignored: marker::PhantomData,
+ }
+ }
+}
+impl<'a, R: Read> Iterator for Entries<'a, R> {
+ type Item = io::Result<Entry<'a, R>>;
+
+ fn next(&mut self) -> Option<io::Result<Entry<'a, R>>> {
+ self.fields
+ .next()
+ .map(|result| result.map(|e| EntryFields::from(e).into_entry()))
+ }
+}
+
+impl<'a> EntriesFields<'a> {
+ fn next_entry_raw(
+ &mut self,
+ pax_extensions: Option<&[u8]>,
+ ) -> io::Result<Option<Entry<'a, io::Empty>>> {
+ let mut header = Header::new_old();
+ let mut header_pos = self.next;
+ loop {
+ // Seek to the start of the next header in the archive
+ let delta = self.next - self.archive.inner.pos.get();
+ self.skip(delta)?;
+
+ // EOF is an indicator that we are at the end of the archive.
+ if !try_read_all(&mut &self.archive.inner, header.as_mut_bytes())? {
+ return Ok(None);
+ }
+
+ // If a header is not all zeros, we have another valid header.
+ // Otherwise, check if we are ignoring zeros and continue, or break as if this is the
+ // end of the archive.
+ if !header.as_bytes().iter().all(|i| *i == 0) {
+ self.next += 512;
+ break;
+ }
+
+ if !self.archive.inner.ignore_zeros {
+ return Ok(None);
+ }
+ self.next += 512;
+ header_pos = self.next;
+ }
+
+ // Make sure the checksum is ok
+ let sum = header.as_bytes()[..148]
+ .iter()
+ .chain(&header.as_bytes()[156..])
+ .fold(0, |a, b| a + (*b as u32))
+ + 8 * 32;
+ let cksum = header.cksum()?;
+ if sum != cksum {
+ return Err(other("archive header checksum mismatch"));
+ }
+
+ let mut pax_size: Option<u64> = None;
+ if let Some(pax_extensions_ref) = &pax_extensions {
+ pax_size = pax_extensions_value(pax_extensions_ref, PAX_SIZE);
+
+ if let Some(pax_uid) = pax_extensions_value(pax_extensions_ref, PAX_UID) {
+ header.set_uid(pax_uid);
+ }
+
+ if let Some(pax_gid) = pax_extensions_value(pax_extensions_ref, PAX_GID) {
+ header.set_gid(pax_gid);
+ }
+ }
+
+ let file_pos = self.next;
+ let mut size = header.entry_size()?;
+ if size == 0 {
+ if let Some(pax_size) = pax_size {
+ size = pax_size;
+ }
+ }
+ let ret = EntryFields {
+ size: size,
+ header_pos: header_pos,
+ file_pos: file_pos,
+ data: vec![EntryIo::Data((&self.archive.inner).take(size))],
+ header: header,
+ long_pathname: None,
+ long_linkname: None,
+ pax_extensions: None,
+ mask: self.archive.inner.mask,
+ unpack_xattrs: self.archive.inner.unpack_xattrs,
+ preserve_permissions: self.archive.inner.preserve_permissions,
+ preserve_mtime: self.archive.inner.preserve_mtime,
+ overwrite: self.archive.inner.overwrite,
+ preserve_ownerships: self.archive.inner.preserve_ownerships,
+ };
+
+ // Store where the next entry is, rounding up by 512 bytes (the size of
+ // a header);
+ let size = size
+ .checked_add(511)
+ .ok_or_else(|| other("size overflow"))?;
+ self.next = self
+ .next
+ .checked_add(size & !(512 - 1))
+ .ok_or_else(|| other("size overflow"))?;
+
+ Ok(Some(ret.into_entry()))
+ }
+
+ fn next_entry(&mut self) -> io::Result<Option<Entry<'a, io::Empty>>> {
+ if self.raw {
+ return self.next_entry_raw(None);
+ }
+
+ let mut gnu_longname = None;
+ let mut gnu_longlink = None;
+ let mut pax_extensions = None;
+ let mut processed = 0;
+ loop {
+ processed += 1;
+ let entry = match self.next_entry_raw(pax_extensions.as_deref())? {
+ Some(entry) => entry,
+ None if processed > 1 => {
+ return Err(other(
+ "members found describing a future member \
+ but no future member found",
+ ));
+ }
+ None => return Ok(None),
+ };
+
+ let is_recognized_header =
+ entry.header().as_gnu().is_some() || entry.header().as_ustar().is_some();
+
+ if is_recognized_header && entry.header().entry_type().is_gnu_longname() {
+ if gnu_longname.is_some() {
+ return Err(other(
+ "two long name entries describing \
+ the same member",
+ ));
+ }
+ gnu_longname = Some(EntryFields::from(entry).read_all()?);
+ continue;
+ }
+
+ if is_recognized_header && entry.header().entry_type().is_gnu_longlink() {
+ if gnu_longlink.is_some() {
+ return Err(other(
+ "two long name entries describing \
+ the same member",
+ ));
+ }
+ gnu_longlink = Some(EntryFields::from(entry).read_all()?);
+ continue;
+ }
+
+ if is_recognized_header && entry.header().entry_type().is_pax_local_extensions() {
+ if pax_extensions.is_some() {
+ return Err(other(
+ "two pax extensions entries describing \
+ the same member",
+ ));
+ }
+ pax_extensions = Some(EntryFields::from(entry).read_all()?);
+ continue;
+ }
+
+ let mut fields = EntryFields::from(entry);
+ fields.long_pathname = gnu_longname;
+ fields.long_linkname = gnu_longlink;
+ fields.pax_extensions = pax_extensions;
+ self.parse_sparse_header(&mut fields)?;
+ return Ok(Some(fields.into_entry()));
+ }
+ }
+
+ fn parse_sparse_header(&mut self, entry: &mut EntryFields<'a>) -> io::Result<()> {
+ if !entry.header.entry_type().is_gnu_sparse() {
+ return Ok(());
+ }
+ let gnu = match entry.header.as_gnu() {
+ Some(gnu) => gnu,
+ None => return Err(other("sparse entry type listed but not GNU header")),
+ };
+
+ // Sparse files are represented internally as a list of blocks that are
+ // read. Blocks are either a bunch of 0's or they're data from the
+ // underlying archive.
+ //
+ // Blocks of a sparse file are described by the `GnuSparseHeader`
+ // structure, some of which are contained in `GnuHeader` but some of
+ // which may also be contained after the first header in further
+ // headers.
+ //
+ // We read off all the blocks here and use the `add_block` function to
+ // incrementally add them to the list of I/O block (in `entry.data`).
+ // The `add_block` function also validates that each chunk comes after
+ // the previous, we don't overrun the end of the file, and each block is
+ // aligned to a 512-byte boundary in the archive itself.
+ //
+ // At the end we verify that the sparse file size (`Header::size`) is
+ // the same as the current offset (described by the list of blocks) as
+ // well as the amount of data read equals the size of the entry
+ // (`Header::entry_size`).
+ entry.data.truncate(0);
+
+ let mut cur = 0;
+ let mut remaining = entry.size;
+ {
+ let data = &mut entry.data;
+ let reader = &self.archive.inner;
+ let size = entry.size;
+ let mut add_block = |block: &GnuSparseHeader| -> io::Result<_> {
+ if block.is_empty() {
+ return Ok(());
+ }
+ let off = block.offset()?;
+ let len = block.length()?;
+ if len != 0 && (size - remaining) % 512 != 0 {
+ return Err(other(
+ "previous block in sparse file was not \
+ aligned to 512-byte boundary",
+ ));
+ } else if off < cur {
+ return Err(other(
+ "out of order or overlapping sparse \
+ blocks",
+ ));
+ } else if cur < off {
+ let block = io::repeat(0).take(off - cur);
+ data.push(EntryIo::Pad(block));
+ }
+ cur = off
+ .checked_add(len)
+ .ok_or_else(|| other("more bytes listed in sparse file than u64 can hold"))?;
+ remaining = remaining.checked_sub(len).ok_or_else(|| {
+ other(
+ "sparse file consumed more data than the header \
+ listed",
+ )
+ })?;
+ data.push(EntryIo::Data(reader.take(len)));
+ Ok(())
+ };
+ for block in gnu.sparse.iter() {
+ add_block(block)?
+ }
+ if gnu.is_extended() {
+ let mut ext = GnuExtSparseHeader::new();
+ ext.isextended[0] = 1;
+ while ext.is_extended() {
+ if !try_read_all(&mut &self.archive.inner, ext.as_mut_bytes())? {
+ return Err(other("failed to read extension"));
+ }
+
+ self.next += 512;
+ for block in ext.sparse.iter() {
+ add_block(block)?;
+ }
+ }
+ }
+ }
+ if cur != gnu.real_size()? {
+ return Err(other(
+ "mismatch in sparse file chunks and \
+ size in header",
+ ));
+ }
+ entry.size = cur;
+ if remaining > 0 {
+ return Err(other(
+ "mismatch in sparse file chunks and \
+ entry size in header",
+ ));
+ }
+ Ok(())
+ }
+
+ fn skip(&mut self, mut amt: u64) -> io::Result<()> {
+ if let Some(seekable_archive) = self.seekable_archive {
+ let pos = io::SeekFrom::Current(
+ i64::try_from(amt).map_err(|_| other("seek position out of bounds"))?,
+ );
+ (&seekable_archive.inner).seek(pos)?;
+ } else {
+ let mut buf = [0u8; 4096 * 8];
+ while amt > 0 {
+ let n = cmp::min(amt, buf.len() as u64);
+ let n = (&self.archive.inner).read(&mut buf[..n as usize])?;
+ if n == 0 {
+ return Err(other("unexpected EOF during skip"));
+ }
+ amt -= n as u64;
+ }
+ }
+ Ok(())
+ }
+}
+
+impl<'a> Iterator for EntriesFields<'a> {
+ type Item = io::Result<Entry<'a, io::Empty>>;
+
+ fn next(&mut self) -> Option<io::Result<Entry<'a, io::Empty>>> {
+ if self.done {
+ None
+ } else {
+ match self.next_entry() {
+ Ok(Some(e)) => Some(Ok(e)),
+ Ok(None) => {
+ self.done = true;
+ None
+ }
+ Err(e) => {
+ self.done = true;
+ Some(Err(e))
+ }
+ }
+ }
+ }
+}
+
+impl<'a, R: ?Sized + Read> Read for &'a ArchiveInner<R> {
+ fn read(&mut self, into: &mut [u8]) -> io::Result<usize> {
+ let i = self.obj.borrow_mut().read(into)?;
+ self.pos.set(self.pos.get() + i as u64);
+ Ok(i)
+ }
+}
+
+impl<'a, R: ?Sized + Seek> Seek for &'a ArchiveInner<R> {
+ fn seek(&mut self, pos: SeekFrom) -> io::Result<u64> {
+ let pos = self.obj.borrow_mut().seek(pos)?;
+ self.pos.set(pos);
+ Ok(pos)
+ }
+}
+
+/// Try to fill the buffer from the reader.
+///
+/// If the reader reaches its end before filling the buffer at all, returns `false`.
+/// Otherwise returns `true`.
+fn try_read_all<R: Read>(r: &mut R, buf: &mut [u8]) -> io::Result<bool> {
+ let mut read = 0;
+ while read < buf.len() {
+ match r.read(&mut buf[read..])? {
+ 0 => {
+ if read == 0 {
+ return Ok(false);
+ }
+
+ return Err(other("failed to read entire block"));
+ }
+ n => read += n,
+ }
+ }
+ Ok(true)
+}
diff --git a/vendor/tar/src/builder.rs b/vendor/tar/src/builder.rs
new file mode 100644
index 0000000..a26eb31
--- /dev/null
+++ b/vendor/tar/src/builder.rs
@@ -0,0 +1,663 @@
+use std::fs;
+use std::io;
+use std::io::prelude::*;
+use std::path::Path;
+use std::str;
+
+use crate::header::{path2bytes, HeaderMode};
+use crate::{other, EntryType, Header};
+
+/// A structure for building archives
+///
+/// This structure has methods for building up an archive from scratch into any
+/// arbitrary writer.
+pub struct Builder<W: Write> {
+ mode: HeaderMode,
+ follow: bool,
+ finished: bool,
+ obj: Option<W>,
+}
+
+impl<W: Write> Builder<W> {
+ /// Create a new archive builder with the underlying object as the
+ /// destination of all data written. The builder will use
+ /// `HeaderMode::Complete` by default.
+ pub fn new(obj: W) -> Builder<W> {
+ Builder {
+ mode: HeaderMode::Complete,
+ follow: true,
+ finished: false,
+ obj: Some(obj),
+ }
+ }
+
+ /// Changes the HeaderMode that will be used when reading fs Metadata for
+ /// methods that implicitly read metadata for an input Path. Notably, this
+ /// does _not_ apply to `append(Header)`.
+ pub fn mode(&mut self, mode: HeaderMode) {
+ self.mode = mode;
+ }
+
+ /// Follow symlinks, archiving the contents of the file they point to rather
+ /// than adding a symlink to the archive. Defaults to true.
+ pub fn follow_symlinks(&mut self, follow: bool) {
+ self.follow = follow;
+ }
+
+ /// Gets shared reference to the underlying object.
+ pub fn get_ref(&self) -> &W {
+ self.obj.as_ref().unwrap()
+ }
+
+ /// Gets mutable reference to the underlying object.
+ ///
+ /// Note that care must be taken while writing to the underlying
+ /// object. But, e.g. `get_mut().flush()` is claimed to be safe and
+ /// useful in the situations when one needs to be ensured that
+ /// tar entry was flushed to the disk.
+ pub fn get_mut(&mut self) -> &mut W {
+ self.obj.as_mut().unwrap()
+ }
+
+ /// Unwrap this archive, returning the underlying object.
+ ///
+ /// This function will finish writing the archive if the `finish` function
+ /// hasn't yet been called, returning any I/O error which happens during
+ /// that operation.
+ pub fn into_inner(mut self) -> io::Result<W> {
+ if !self.finished {
+ self.finish()?;
+ }
+ Ok(self.obj.take().unwrap())
+ }
+
+ /// Adds a new entry to this archive.
+ ///
+ /// This function will append the header specified, followed by contents of
+ /// the stream specified by `data`. To produce a valid archive the `size`
+ /// field of `header` must be the same as the length of the stream that's
+ /// being written. Additionally the checksum for the header should have been
+ /// set via the `set_cksum` method.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Also note that after all entries have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Errors
+ ///
+ /// This function will return an error for any intermittent I/O error which
+ /// occurs when either reading or writing.
+ ///
+ /// # Examples
+ ///
+ /// ```
+ /// use tar::{Builder, Header};
+ ///
+ /// let mut header = Header::new_gnu();
+ /// header.set_path("foo").unwrap();
+ /// header.set_size(4);
+ /// header.set_cksum();
+ ///
+ /// let mut data: &[u8] = &[1, 2, 3, 4];
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ /// ar.append(&header, data).unwrap();
+ /// let data = ar.into_inner().unwrap();
+ /// ```
+ pub fn append<R: Read>(&mut self, header: &Header, mut data: R) -> io::Result<()> {
+ append(self.get_mut(), header, &mut data)
+ }
+
+ /// Adds a new entry to this archive with the specified path.
+ ///
+ /// This function will set the specified path in the given header, which may
+ /// require appending a GNU long-name extension entry to the archive first.
+ /// The checksum for the header will be automatically updated via the
+ /// `set_cksum` method after setting the path. No other metadata in the
+ /// header will be modified.
+ ///
+ /// Then it will append the header, followed by contents of the stream
+ /// specified by `data`. To produce a valid archive the `size` field of
+ /// `header` must be the same as the length of the stream that's being
+ /// written.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Also note that after all entries have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Errors
+ ///
+ /// This function will return an error for any intermittent I/O error which
+ /// occurs when either reading or writing.
+ ///
+ /// # Examples
+ ///
+ /// ```
+ /// use tar::{Builder, Header};
+ ///
+ /// let mut header = Header::new_gnu();
+ /// header.set_size(4);
+ /// header.set_cksum();
+ ///
+ /// let mut data: &[u8] = &[1, 2, 3, 4];
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ /// ar.append_data(&mut header, "really/long/path/to/foo", data).unwrap();
+ /// let data = ar.into_inner().unwrap();
+ /// ```
+ pub fn append_data<P: AsRef<Path>, R: Read>(
+ &mut self,
+ header: &mut Header,
+ path: P,
+ data: R,
+ ) -> io::Result<()> {
+ prepare_header_path(self.get_mut(), header, path.as_ref())?;
+ header.set_cksum();
+ self.append(&header, data)
+ }
+
+ /// Adds a new link (symbolic or hard) entry to this archive with the specified path and target.
+ ///
+ /// This function is similar to [`Self::append_data`] which supports long filenames,
+ /// but also supports long link targets using GNU extensions if necessary.
+ /// You must set the entry type to either [`EntryType::Link`] or [`EntryType::Symlink`].
+ /// The `set_cksum` method will be invoked after setting the path. No other metadata in the
+ /// header will be modified.
+ ///
+ /// If you are intending to use GNU extensions, you must use this method over calling
+ /// [`Header::set_link_name`] because that function will fail on long links.
+ ///
+ /// Similar constraints around the position of the archive and completion
+ /// apply as with [`Self::append_data`].
+ ///
+ /// # Errors
+ ///
+ /// This function will return an error for any intermittent I/O error which
+ /// occurs when either reading or writing.
+ ///
+ /// # Examples
+ ///
+ /// ```
+ /// use tar::{Builder, Header, EntryType};
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ /// let mut header = Header::new_gnu();
+ /// header.set_username("foo");
+ /// header.set_entry_type(EntryType::Symlink);
+ /// header.set_size(0);
+ /// ar.append_link(&mut header, "really/long/path/to/foo", "other/really/long/target").unwrap();
+ /// let data = ar.into_inner().unwrap();
+ /// ```
+ pub fn append_link<P: AsRef<Path>, T: AsRef<Path>>(
+ &mut self,
+ header: &mut Header,
+ path: P,
+ target: T,
+ ) -> io::Result<()> {
+ self._append_link(header, path.as_ref(), target.as_ref())
+ }
+
+ fn _append_link(&mut self, header: &mut Header, path: &Path, target: &Path) -> io::Result<()> {
+ prepare_header_path(self.get_mut(), header, path)?;
+ prepare_header_link(self.get_mut(), header, target)?;
+ header.set_cksum();
+ self.append(&header, std::io::empty())
+ }
+
+ /// Adds a file on the local filesystem to this archive.
+ ///
+ /// This function will open the file specified by `path` and insert the file
+ /// into the archive with the appropriate metadata set, returning any I/O
+ /// error which occurs while writing. The path name for the file inside of
+ /// this archive will be the same as `path`, and it is required that the
+ /// path is a relative path.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Also note that after all files have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use tar::Builder;
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ ///
+ /// ar.append_path("foo/bar.txt").unwrap();
+ /// ```
+ pub fn append_path<P: AsRef<Path>>(&mut self, path: P) -> io::Result<()> {
+ let mode = self.mode.clone();
+ let follow = self.follow;
+ append_path_with_name(self.get_mut(), path.as_ref(), None, mode, follow)
+ }
+
+ /// Adds a file on the local filesystem to this archive under another name.
+ ///
+ /// This function will open the file specified by `path` and insert the file
+ /// into the archive as `name` with appropriate metadata set, returning any
+ /// I/O error which occurs while writing. The path name for the file inside
+ /// of this archive will be `name` is required to be a relative path.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Note if the `path` is a directory. This will just add an entry to the archive,
+ /// rather than contents of the directory.
+ ///
+ /// Also note that after all files have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use tar::Builder;
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ ///
+ /// // Insert the local file "foo/bar.txt" in the archive but with the name
+ /// // "bar/foo.txt".
+ /// ar.append_path_with_name("foo/bar.txt", "bar/foo.txt").unwrap();
+ /// ```
+ pub fn append_path_with_name<P: AsRef<Path>, N: AsRef<Path>>(
+ &mut self,
+ path: P,
+ name: N,
+ ) -> io::Result<()> {
+ let mode = self.mode.clone();
+ let follow = self.follow;
+ append_path_with_name(
+ self.get_mut(),
+ path.as_ref(),
+ Some(name.as_ref()),
+ mode,
+ follow,
+ )
+ }
+
+ /// Adds a file to this archive with the given path as the name of the file
+ /// in the archive.
+ ///
+ /// This will use the metadata of `file` to populate a `Header`, and it will
+ /// then append the file to the archive with the name `path`.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Also note that after all files have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use std::fs::File;
+ /// use tar::Builder;
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ ///
+ /// // Open the file at one location, but insert it into the archive with a
+ /// // different name.
+ /// let mut f = File::open("foo/bar/baz.txt").unwrap();
+ /// ar.append_file("bar/baz.txt", &mut f).unwrap();
+ /// ```
+ pub fn append_file<P: AsRef<Path>>(&mut self, path: P, file: &mut fs::File) -> io::Result<()> {
+ let mode = self.mode.clone();
+ append_file(self.get_mut(), path.as_ref(), file, mode)
+ }
+
+ /// Adds a directory to this archive with the given path as the name of the
+ /// directory in the archive.
+ ///
+ /// This will use `stat` to populate a `Header`, and it will then append the
+ /// directory to the archive with the name `path`.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Note this will not add the contents of the directory to the archive.
+ /// See `append_dir_all` for recusively adding the contents of the directory.
+ ///
+ /// Also note that after all files have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Examples
+ ///
+ /// ```
+ /// use std::fs;
+ /// use tar::Builder;
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ ///
+ /// // Use the directory at one location, but insert it into the archive
+ /// // with a different name.
+ /// ar.append_dir("bardir", ".").unwrap();
+ /// ```
+ pub fn append_dir<P, Q>(&mut self, path: P, src_path: Q) -> io::Result<()>
+ where
+ P: AsRef<Path>,
+ Q: AsRef<Path>,
+ {
+ let mode = self.mode.clone();
+ append_dir(self.get_mut(), path.as_ref(), src_path.as_ref(), mode)
+ }
+
+ /// Adds a directory and all of its contents (recursively) to this archive
+ /// with the given path as the name of the directory in the archive.
+ ///
+ /// Note that this will not attempt to seek the archive to a valid position,
+ /// so if the archive is in the middle of a read or some other similar
+ /// operation then this may corrupt the archive.
+ ///
+ /// Also note that after all files have been written to an archive the
+ /// `finish` function needs to be called to finish writing the archive.
+ ///
+ /// # Examples
+ ///
+ /// ```
+ /// use std::fs;
+ /// use tar::Builder;
+ ///
+ /// let mut ar = Builder::new(Vec::new());
+ ///
+ /// // Use the directory at one location, but insert it into the archive
+ /// // with a different name.
+ /// ar.append_dir_all("bardir", ".").unwrap();
+ /// ```
+ pub fn append_dir_all<P, Q>(&mut self, path: P, src_path: Q) -> io::Result<()>
+ where
+ P: AsRef<Path>,
+ Q: AsRef<Path>,
+ {
+ let mode = self.mode.clone();
+ let follow = self.follow;
+ append_dir_all(
+ self.get_mut(),
+ path.as_ref(),
+ src_path.as_ref(),
+ mode,
+ follow,
+ )
+ }
+
+ /// Finish writing this archive, emitting the termination sections.
+ ///
+ /// This function should only be called when the archive has been written
+ /// entirely and if an I/O error happens the underlying object still needs
+ /// to be acquired.
+ ///
+ /// In most situations the `into_inner` method should be preferred.
+ pub fn finish(&mut self) -> io::Result<()> {
+ if self.finished {
+ return Ok(());
+ }
+ self.finished = true;
+ self.get_mut().write_all(&[0; 1024])
+ }
+}
+
+fn append(mut dst: &mut dyn Write, header: &Header, mut data: &mut dyn Read) -> io::Result<()> {
+ dst.write_all(header.as_bytes())?;
+ let len = io::copy(&mut data, &mut dst)?;
+
+ // Pad with zeros if necessary.
+ let buf = [0; 512];
+ let remaining = 512 - (len % 512);
+ if remaining < 512 {
+ dst.write_all(&buf[..remaining as usize])?;
+ }
+
+ Ok(())
+}
+
+fn append_path_with_name(
+ dst: &mut dyn Write,
+ path: &Path,
+ name: Option<&Path>,
+ mode: HeaderMode,
+ follow: bool,
+) -> io::Result<()> {
+ let stat = if follow {
+ fs::metadata(path).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting metadata for {}", err, path.display()),
+ )
+ })?
+ } else {
+ fs::symlink_metadata(path).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting metadata for {}", err, path.display()),
+ )
+ })?
+ };
+ let ar_name = name.unwrap_or(path);
+ if stat.is_file() {
+ append_fs(dst, ar_name, &stat, &mut fs::File::open(path)?, mode, None)
+ } else if stat.is_dir() {
+ append_fs(dst, ar_name, &stat, &mut io::empty(), mode, None)
+ } else if stat.file_type().is_symlink() {
+ let link_name = fs::read_link(path)?;
+ append_fs(
+ dst,
+ ar_name,
+ &stat,
+ &mut io::empty(),
+ mode,
+ Some(&link_name),
+ )
+ } else {
+ #[cfg(unix)]
+ {
+ append_special(dst, path, &stat, mode)
+ }
+ #[cfg(not(unix))]
+ {
+ Err(other(&format!("{} has unknown file type", path.display())))
+ }
+ }
+}
+
+#[cfg(unix)]
+fn append_special(
+ dst: &mut dyn Write,
+ path: &Path,
+ stat: &fs::Metadata,
+ mode: HeaderMode,
+) -> io::Result<()> {
+ use ::std::os::unix::fs::{FileTypeExt, MetadataExt};
+
+ let file_type = stat.file_type();
+ let entry_type;
+ if file_type.is_socket() {
+ // sockets can't be archived
+ return Err(other(&format!(
+ "{}: socket can not be archived",
+ path.display()
+ )));
+ } else if file_type.is_fifo() {
+ entry_type = EntryType::Fifo;
+ } else if file_type.is_char_device() {
+ entry_type = EntryType::Char;
+ } else if file_type.is_block_device() {
+ entry_type = EntryType::Block;
+ } else {
+ return Err(other(&format!("{} has unknown file type", path.display())));
+ }
+
+ let mut header = Header::new_gnu();
+ header.set_metadata_in_mode(stat, mode);
+ prepare_header_path(dst, &mut header, path)?;
+
+ header.set_entry_type(entry_type);
+ let dev_id = stat.rdev();
+ let dev_major = ((dev_id >> 32) & 0xffff_f000) | ((dev_id >> 8) & 0x0000_0fff);
+ let dev_minor = ((dev_id >> 12) & 0xffff_ff00) | ((dev_id) & 0x0000_00ff);
+ header.set_device_major(dev_major as u32)?;
+ header.set_device_minor(dev_minor as u32)?;
+
+ header.set_cksum();
+ dst.write_all(header.as_bytes())?;
+
+ Ok(())
+}
+
+fn append_file(
+ dst: &mut dyn Write,
+ path: &Path,
+ file: &mut fs::File,
+ mode: HeaderMode,
+) -> io::Result<()> {
+ let stat = file.metadata()?;
+ append_fs(dst, path, &stat, file, mode, None)
+}
+
+fn append_dir(
+ dst: &mut dyn Write,
+ path: &Path,
+ src_path: &Path,
+ mode: HeaderMode,
+) -> io::Result<()> {
+ let stat = fs::metadata(src_path)?;
+ append_fs(dst, path, &stat, &mut io::empty(), mode, None)
+}
+
+fn prepare_header(size: u64, entry_type: u8) -> Header {
+ let mut header = Header::new_gnu();
+ let name = b"././@LongLink";
+ header.as_gnu_mut().unwrap().name[..name.len()].clone_from_slice(&name[..]);
+ header.set_mode(0o644);
+ header.set_uid(0);
+ header.set_gid(0);
+ header.set_mtime(0);
+ // + 1 to be compliant with GNU tar
+ header.set_size(size + 1);
+ header.set_entry_type(EntryType::new(entry_type));
+ header.set_cksum();
+ header
+}
+
+fn prepare_header_path(dst: &mut dyn Write, header: &mut Header, path: &Path) -> io::Result<()> {
+ // Try to encode the path directly in the header, but if it ends up not
+ // working (probably because it's too long) then try to use the GNU-specific
+ // long name extension by emitting an entry which indicates that it's the
+ // filename.
+ if let Err(e) = header.set_path(path) {
+ let data = path2bytes(&path)?;
+ let max = header.as_old().name.len();
+ // Since `e` isn't specific enough to let us know the path is indeed too
+ // long, verify it first before using the extension.
+ if data.len() < max {
+ return Err(e);
+ }
+ let header2 = prepare_header(data.len() as u64, b'L');
+ // null-terminated string
+ let mut data2 = data.chain(io::repeat(0).take(1));
+ append(dst, &header2, &mut data2)?;
+
+ // Truncate the path to store in the header we're about to emit to
+ // ensure we've got something at least mentioned. Note that we use
+ // `str`-encoding to be compatible with Windows, but in general the
+ // entry in the header itself shouldn't matter too much since extraction
+ // doesn't look at it.
+ let truncated = match str::from_utf8(&data[..max]) {
+ Ok(s) => s,
+ Err(e) => str::from_utf8(&data[..e.valid_up_to()]).unwrap(),
+ };
+ header.set_path(truncated)?;
+ }
+ Ok(())
+}
+
+fn prepare_header_link(
+ dst: &mut dyn Write,
+ header: &mut Header,
+ link_name: &Path,
+) -> io::Result<()> {
+ // Same as previous function but for linkname
+ if let Err(e) = header.set_link_name(&link_name) {
+ let data = path2bytes(&link_name)?;
+ if data.len() < header.as_old().linkname.len() {
+ return Err(e);
+ }
+ let header2 = prepare_header(data.len() as u64, b'K');
+ let mut data2 = data.chain(io::repeat(0).take(1));
+ append(dst, &header2, &mut data2)?;
+ }
+ Ok(())
+}
+
+fn append_fs(
+ dst: &mut dyn Write,
+ path: &Path,
+ meta: &fs::Metadata,
+ read: &mut dyn Read,
+ mode: HeaderMode,
+ link_name: Option<&Path>,
+) -> io::Result<()> {
+ let mut header = Header::new_gnu();
+
+ prepare_header_path(dst, &mut header, path)?;
+ header.set_metadata_in_mode(meta, mode);
+ if let Some(link_name) = link_name {
+ prepare_header_link(dst, &mut header, link_name)?;
+ }
+ header.set_cksum();
+ append(dst, &header, read)
+}
+
+fn append_dir_all(
+ dst: &mut dyn Write,
+ path: &Path,
+ src_path: &Path,
+ mode: HeaderMode,
+ follow: bool,
+) -> io::Result<()> {
+ let mut stack = vec![(src_path.to_path_buf(), true, false)];
+ while let Some((src, is_dir, is_symlink)) = stack.pop() {
+ let dest = path.join(src.strip_prefix(&src_path).unwrap());
+ // In case of a symlink pointing to a directory, is_dir is false, but src.is_dir() will return true
+ if is_dir || (is_symlink && follow && src.is_dir()) {
+ for entry in fs::read_dir(&src)? {
+ let entry = entry?;
+ let file_type = entry.file_type()?;
+ stack.push((entry.path(), file_type.is_dir(), file_type.is_symlink()));
+ }
+ if dest != Path::new("") {
+ append_dir(dst, &dest, &src, mode)?;
+ }
+ } else if !follow && is_symlink {
+ let stat = fs::symlink_metadata(&src)?;
+ let link_name = fs::read_link(&src)?;
+ append_fs(dst, &dest, &stat, &mut io::empty(), mode, Some(&link_name))?;
+ } else {
+ #[cfg(unix)]
+ {
+ let stat = fs::metadata(&src)?;
+ if !stat.is_file() {
+ append_special(dst, &dest, &stat, mode)?;
+ continue;
+ }
+ }
+ append_file(dst, &dest, &mut fs::File::open(src)?, mode)?;
+ }
+ }
+ Ok(())
+}
+
+impl<W: Write> Drop for Builder<W> {
+ fn drop(&mut self) {
+ let _ = self.finish();
+ }
+}
diff --git a/vendor/tar/src/entry.rs b/vendor/tar/src/entry.rs
new file mode 100644
index 0000000..c81554f
--- /dev/null
+++ b/vendor/tar/src/entry.rs
@@ -0,0 +1,972 @@
+use std::borrow::Cow;
+use std::cmp;
+use std::fs;
+use std::fs::OpenOptions;
+use std::io::prelude::*;
+use std::io::{self, Error, ErrorKind, SeekFrom};
+use std::marker;
+use std::path::{Component, Path, PathBuf};
+
+use filetime::{self, FileTime};
+
+use crate::archive::ArchiveInner;
+use crate::error::TarError;
+use crate::header::bytes2path;
+use crate::other;
+use crate::{Archive, Header, PaxExtensions};
+
+/// A read-only view into an entry of an archive.
+///
+/// This structure is a window into a portion of a borrowed archive which can
+/// be inspected. It acts as a file handle by implementing the Reader trait. An
+/// entry cannot be rewritten once inserted into an archive.
+pub struct Entry<'a, R: 'a + Read> {
+ fields: EntryFields<'a>,
+ _ignored: marker::PhantomData<&'a Archive<R>>,
+}
+
+// private implementation detail of `Entry`, but concrete (no type parameters)
+// and also all-public to be constructed from other modules.
+pub struct EntryFields<'a> {
+ pub long_pathname: Option<Vec<u8>>,
+ pub long_linkname: Option<Vec<u8>>,
+ pub pax_extensions: Option<Vec<u8>>,
+ pub mask: u32,
+ pub header: Header,
+ pub size: u64,
+ pub header_pos: u64,
+ pub file_pos: u64,
+ pub data: Vec<EntryIo<'a>>,
+ pub unpack_xattrs: bool,
+ pub preserve_permissions: bool,
+ pub preserve_ownerships: bool,
+ pub preserve_mtime: bool,
+ pub overwrite: bool,
+}
+
+pub enum EntryIo<'a> {
+ Pad(io::Take<io::Repeat>),
+ Data(io::Take<&'a ArchiveInner<dyn Read + 'a>>),
+}
+
+/// When unpacking items the unpacked thing is returned to allow custom
+/// additional handling by users. Today the File is returned, in future
+/// the enum may be extended with kinds for links, directories etc.
+#[derive(Debug)]
+pub enum Unpacked {
+ /// A file was unpacked.
+ File(std::fs::File),
+ /// A directory, hardlink, symlink, or other node was unpacked.
+ #[doc(hidden)]
+ __Nonexhaustive,
+}
+
+impl<'a, R: Read> Entry<'a, R> {
+ /// Returns the path name for this entry.
+ ///
+ /// This method may fail if the pathname is not valid Unicode and this is
+ /// called on a Windows platform.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators, and it will not always return the same value as
+ /// `self.header().path()` as some archive formats have support for longer
+ /// path names described in separate entries.
+ ///
+ /// It is recommended to use this method instead of inspecting the `header`
+ /// directly to ensure that various archive formats are handled correctly.
+ pub fn path(&self) -> io::Result<Cow<Path>> {
+ self.fields.path()
+ }
+
+ /// Returns the raw bytes listed for this entry.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators, and it will not always return the same value as
+ /// `self.header().path_bytes()` as some archive formats have support for
+ /// longer path names described in separate entries.
+ pub fn path_bytes(&self) -> Cow<[u8]> {
+ self.fields.path_bytes()
+ }
+
+ /// Returns the link name for this entry, if any is found.
+ ///
+ /// This method may fail if the pathname is not valid Unicode and this is
+ /// called on a Windows platform. `Ok(None)` being returned, however,
+ /// indicates that the link name was not present.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators, and it will not always return the same value as
+ /// `self.header().link_name()` as some archive formats have support for
+ /// longer path names described in separate entries.
+ ///
+ /// It is recommended to use this method instead of inspecting the `header`
+ /// directly to ensure that various archive formats are handled correctly.
+ pub fn link_name(&self) -> io::Result<Option<Cow<Path>>> {
+ self.fields.link_name()
+ }
+
+ /// Returns the link name for this entry, in bytes, if listed.
+ ///
+ /// Note that this will not always return the same value as
+ /// `self.header().link_name_bytes()` as some archive formats have support for
+ /// longer path names described in separate entries.
+ pub fn link_name_bytes(&self) -> Option<Cow<[u8]>> {
+ self.fields.link_name_bytes()
+ }
+
+ /// Returns an iterator over the pax extensions contained in this entry.
+ ///
+ /// Pax extensions are a form of archive where extra metadata is stored in
+ /// key/value pairs in entries before the entry they're intended to
+ /// describe. For example this can be used to describe long file name or
+ /// other metadata like atime/ctime/mtime in more precision.
+ ///
+ /// The returned iterator will yield key/value pairs for each extension.
+ ///
+ /// `None` will be returned if this entry does not indicate that it itself
+ /// contains extensions, or if there were no previous extensions describing
+ /// it.
+ ///
+ /// Note that global pax extensions are intended to be applied to all
+ /// archive entries.
+ ///
+ /// Also note that this function will read the entire entry if the entry
+ /// itself is a list of extensions.
+ pub fn pax_extensions(&mut self) -> io::Result<Option<PaxExtensions>> {
+ self.fields.pax_extensions()
+ }
+
+ /// Returns access to the header of this entry in the archive.
+ ///
+ /// This provides access to the metadata for this entry in the archive.
+ pub fn header(&self) -> &Header {
+ &self.fields.header
+ }
+
+ /// Returns access to the size of this entry in the archive.
+ ///
+ /// In the event the size is stored in a pax extension, that size value
+ /// will be referenced. Otherwise, the entry size will be stored in the header.
+ pub fn size(&self) -> u64 {
+ self.fields.size
+ }
+
+ /// Returns the starting position, in bytes, of the header of this entry in
+ /// the archive.
+ ///
+ /// The header is always a contiguous section of 512 bytes, so if the
+ /// underlying reader implements `Seek`, then the slice from `header_pos` to
+ /// `header_pos + 512` contains the raw header bytes.
+ pub fn raw_header_position(&self) -> u64 {
+ self.fields.header_pos
+ }
+
+ /// Returns the starting position, in bytes, of the file of this entry in
+ /// the archive.
+ ///
+ /// If the file of this entry is continuous (e.g. not a sparse file), and
+ /// if the underlying reader implements `Seek`, then the slice from
+ /// `file_pos` to `file_pos + entry_size` contains the raw file bytes.
+ pub fn raw_file_position(&self) -> u64 {
+ self.fields.file_pos
+ }
+
+ /// Writes this file to the specified location.
+ ///
+ /// This function will write the entire contents of this file into the
+ /// location specified by `dst`. Metadata will also be propagated to the
+ /// path `dst`.
+ ///
+ /// This function will create a file at the path `dst`, and it is required
+ /// that the intermediate directories are created. Any existing file at the
+ /// location `dst` will be overwritten.
+ ///
+ /// > **Note**: This function does not have as many sanity checks as
+ /// > `Archive::unpack` or `Entry::unpack_in`. As a result if you're
+ /// > thinking of unpacking untrusted tarballs you may want to review the
+ /// > implementations of the previous two functions and perhaps implement
+ /// > similar logic yourself.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use std::fs::File;
+ /// use tar::Archive;
+ ///
+ /// let mut ar = Archive::new(File::open("foo.tar").unwrap());
+ ///
+ /// for (i, file) in ar.entries().unwrap().enumerate() {
+ /// let mut file = file.unwrap();
+ /// file.unpack(format!("file-{}", i)).unwrap();
+ /// }
+ /// ```
+ pub fn unpack<P: AsRef<Path>>(&mut self, dst: P) -> io::Result<Unpacked> {
+ self.fields.unpack(None, dst.as_ref())
+ }
+
+ /// Extracts this file under the specified path, avoiding security issues.
+ ///
+ /// This function will write the entire contents of this file into the
+ /// location obtained by appending the path of this file in the archive to
+ /// `dst`, creating any intermediate directories if needed. Metadata will
+ /// also be propagated to the path `dst`. Any existing file at the location
+ /// `dst` will be overwritten.
+ ///
+ /// This function carefully avoids writing outside of `dst`. If the file has
+ /// a '..' in its path, this function will skip it and return false.
+ ///
+ /// # Examples
+ ///
+ /// ```no_run
+ /// use std::fs::File;
+ /// use tar::Archive;
+ ///
+ /// let mut ar = Archive::new(File::open("foo.tar").unwrap());
+ ///
+ /// for (i, file) in ar.entries().unwrap().enumerate() {
+ /// let mut file = file.unwrap();
+ /// file.unpack_in("target").unwrap();
+ /// }
+ /// ```
+ pub fn unpack_in<P: AsRef<Path>>(&mut self, dst: P) -> io::Result<bool> {
+ self.fields.unpack_in(dst.as_ref())
+ }
+
+ /// Set the mask of the permission bits when unpacking this entry.
+ ///
+ /// The mask will be inverted when applying against a mode, similar to how
+ /// `umask` works on Unix. In logical notation it looks like:
+ ///
+ /// ```text
+ /// new_mode = old_mode & (~mask)
+ /// ```
+ ///
+ /// The mask is 0 by default and is currently only implemented on Unix.
+ pub fn set_mask(&mut self, mask: u32) {
+ self.fields.mask = mask;
+ }
+
+ /// Indicate whether extended file attributes (xattrs on Unix) are preserved
+ /// when unpacking this entry.
+ ///
+ /// This flag is disabled by default and is currently only implemented on
+ /// Unix using xattr support. This may eventually be implemented for
+ /// Windows, however, if other archive implementations are found which do
+ /// this as well.
+ pub fn set_unpack_xattrs(&mut self, unpack_xattrs: bool) {
+ self.fields.unpack_xattrs = unpack_xattrs;
+ }
+
+ /// Indicate whether extended permissions (like suid on Unix) are preserved
+ /// when unpacking this entry.
+ ///
+ /// This flag is disabled by default and is currently only implemented on
+ /// Unix.
+ pub fn set_preserve_permissions(&mut self, preserve: bool) {
+ self.fields.preserve_permissions = preserve;
+ }
+
+ /// Indicate whether access time information is preserved when unpacking
+ /// this entry.
+ ///
+ /// This flag is enabled by default.
+ pub fn set_preserve_mtime(&mut self, preserve: bool) {
+ self.fields.preserve_mtime = preserve;
+ }
+}
+
+impl<'a, R: Read> Read for Entry<'a, R> {
+ fn read(&mut self, into: &mut [u8]) -> io::Result<usize> {
+ self.fields.read(into)
+ }
+}
+
+impl<'a> EntryFields<'a> {
+ pub fn from<R: Read>(entry: Entry<R>) -> EntryFields {
+ entry.fields
+ }
+
+ pub fn into_entry<R: Read>(self) -> Entry<'a, R> {
+ Entry {
+ fields: self,
+ _ignored: marker::PhantomData,
+ }
+ }
+
+ pub fn read_all(&mut self) -> io::Result<Vec<u8>> {
+ // Preallocate some data but don't let ourselves get too crazy now.
+ let cap = cmp::min(self.size, 128 * 1024);
+ let mut v = Vec::with_capacity(cap as usize);
+ self.read_to_end(&mut v).map(|_| v)
+ }
+
+ fn path(&self) -> io::Result<Cow<Path>> {
+ bytes2path(self.path_bytes())
+ }
+
+ fn path_bytes(&self) -> Cow<[u8]> {
+ match self.long_pathname {
+ Some(ref bytes) => {
+ if let Some(&0) = bytes.last() {
+ Cow::Borrowed(&bytes[..bytes.len() - 1])
+ } else {
+ Cow::Borrowed(bytes)
+ }
+ }
+ None => {
+ if let Some(ref pax) = self.pax_extensions {
+ let pax = PaxExtensions::new(pax)
+ .filter_map(|f| f.ok())
+ .find(|f| f.key_bytes() == b"path")
+ .map(|f| f.value_bytes());
+ if let Some(field) = pax {
+ return Cow::Borrowed(field);
+ }
+ }
+ self.header.path_bytes()
+ }
+ }
+ }
+
+ /// Gets the path in a "lossy" way, used for error reporting ONLY.
+ fn path_lossy(&self) -> String {
+ String::from_utf8_lossy(&self.path_bytes()).to_string()
+ }
+
+ fn link_name(&self) -> io::Result<Option<Cow<Path>>> {
+ match self.link_name_bytes() {
+ Some(bytes) => bytes2path(bytes).map(Some),
+ None => Ok(None),
+ }
+ }
+
+ fn link_name_bytes(&self) -> Option<Cow<[u8]>> {
+ match self.long_linkname {
+ Some(ref bytes) => {
+ if let Some(&0) = bytes.last() {
+ Some(Cow::Borrowed(&bytes[..bytes.len() - 1]))
+ } else {
+ Some(Cow::Borrowed(bytes))
+ }
+ }
+ None => {
+ if let Some(ref pax) = self.pax_extensions {
+ let pax = PaxExtensions::new(pax)
+ .filter_map(|f| f.ok())
+ .find(|f| f.key_bytes() == b"linkpath")
+ .map(|f| f.value_bytes());
+ if let Some(field) = pax {
+ return Some(Cow::Borrowed(field));
+ }
+ }
+ self.header.link_name_bytes()
+ }
+ }
+ }
+
+ fn pax_extensions(&mut self) -> io::Result<Option<PaxExtensions>> {
+ if self.pax_extensions.is_none() {
+ if !self.header.entry_type().is_pax_global_extensions()
+ && !self.header.entry_type().is_pax_local_extensions()
+ {
+ return Ok(None);
+ }
+ self.pax_extensions = Some(self.read_all()?);
+ }
+ Ok(Some(PaxExtensions::new(
+ self.pax_extensions.as_ref().unwrap(),
+ )))
+ }
+
+ fn unpack_in(&mut self, dst: &Path) -> io::Result<bool> {
+ // Notes regarding bsdtar 2.8.3 / libarchive 2.8.3:
+ // * Leading '/'s are trimmed. For example, `///test` is treated as
+ // `test`.
+ // * If the filename contains '..', then the file is skipped when
+ // extracting the tarball.
+ // * '//' within a filename is effectively skipped. An error is
+ // logged, but otherwise the effect is as if any two or more
+ // adjacent '/'s within the filename were consolidated into one
+ // '/'.
+ //
+ // Most of this is handled by the `path` module of the standard
+ // library, but we specially handle a few cases here as well.
+
+ let mut file_dst = dst.to_path_buf();
+ {
+ let path = self.path().map_err(|e| {
+ TarError::new(
+ format!("invalid path in entry header: {}", self.path_lossy()),
+ e,
+ )
+ })?;
+ for part in path.components() {
+ match part {
+ // Leading '/' characters, root paths, and '.'
+ // components are just ignored and treated as "empty
+ // components"
+ Component::Prefix(..) | Component::RootDir | Component::CurDir => continue,
+
+ // If any part of the filename is '..', then skip over
+ // unpacking the file to prevent directory traversal
+ // security issues. See, e.g.: CVE-2001-1267,
+ // CVE-2002-0399, CVE-2005-1918, CVE-2007-4131
+ Component::ParentDir => return Ok(false),
+
+ Component::Normal(part) => file_dst.push(part),
+ }
+ }
+ }
+
+ // Skip cases where only slashes or '.' parts were seen, because
+ // this is effectively an empty filename.
+ if *dst == *file_dst {
+ return Ok(true);
+ }
+
+ // Skip entries without a parent (i.e. outside of FS root)
+ let parent = match file_dst.parent() {
+ Some(p) => p,
+ None => return Ok(false),
+ };
+
+ self.ensure_dir_created(&dst, parent)
+ .map_err(|e| TarError::new(format!("failed to create `{}`", parent.display()), e))?;
+
+ let canon_target = self.validate_inside_dst(&dst, parent)?;
+
+ self.unpack(Some(&canon_target), &file_dst)
+ .map_err(|e| TarError::new(format!("failed to unpack `{}`", file_dst.display()), e))?;
+
+ Ok(true)
+ }
+
+ /// Unpack as destination directory `dst`.
+ fn unpack_dir(&mut self, dst: &Path) -> io::Result<()> {
+ // If the directory already exists just let it slide
+ fs::create_dir(dst).or_else(|err| {
+ if err.kind() == ErrorKind::AlreadyExists {
+ let prev = fs::metadata(dst);
+ if prev.map(|m| m.is_dir()).unwrap_or(false) {
+ return Ok(());
+ }
+ }
+ Err(Error::new(
+ err.kind(),
+ format!("{} when creating dir {}", err, dst.display()),
+ ))
+ })
+ }
+
+ /// Returns access to the header of this entry in the archive.
+ fn unpack(&mut self, target_base: Option<&Path>, dst: &Path) -> io::Result<Unpacked> {
+ fn set_perms_ownerships(
+ dst: &Path,
+ f: Option<&mut std::fs::File>,
+ header: &Header,
+ mask: u32,
+ perms: bool,
+ ownerships: bool,
+ ) -> io::Result<()> {
+ // ownerships need to be set first to avoid stripping SUID bits in the permissions ...
+ if ownerships {
+ set_ownerships(dst, &f, header.uid()?, header.gid()?)?;
+ }
+ // ... then set permissions, SUID bits set here is kept
+ if let Ok(mode) = header.mode() {
+ set_perms(dst, f, mode, mask, perms)?;
+ }
+
+ Ok(())
+ }
+
+ fn get_mtime(header: &Header) -> Option<FileTime> {
+ header.mtime().ok().map(|mtime| {
+ // For some more information on this see the comments in
+ // `Header::fill_platform_from`, but the general idea is that
+ // we're trying to avoid 0-mtime files coming out of archives
+ // since some tools don't ingest them well. Perhaps one day
+ // when Cargo stops working with 0-mtime archives we can remove
+ // this.
+ let mtime = if mtime == 0 { 1 } else { mtime };
+ FileTime::from_unix_time(mtime as i64, 0)
+ })
+ }
+
+ let kind = self.header.entry_type();
+
+ if kind.is_dir() {
+ self.unpack_dir(dst)?;
+ set_perms_ownerships(
+ dst,
+ None,
+ &self.header,
+ self.mask,
+ self.preserve_permissions,
+ self.preserve_ownerships,
+ )?;
+ return Ok(Unpacked::__Nonexhaustive);
+ } else if kind.is_hard_link() || kind.is_symlink() {
+ let src = match self.link_name()? {
+ Some(name) => name,
+ None => {
+ return Err(other(&format!(
+ "hard link listed for {} but no link name found",
+ String::from_utf8_lossy(self.header.as_bytes())
+ )));
+ }
+ };
+
+ if src.iter().count() == 0 {
+ return Err(other(&format!(
+ "symlink destination for {} is empty",
+ String::from_utf8_lossy(self.header.as_bytes())
+ )));
+ }
+
+ if kind.is_hard_link() {
+ let link_src = match target_base {
+ // If we're unpacking within a directory then ensure that
+ // the destination of this hard link is both present and
+ // inside our own directory. This is needed because we want
+ // to make sure to not overwrite anything outside the root.
+ //
+ // Note that this logic is only needed for hard links
+ // currently. With symlinks the `validate_inside_dst` which
+ // happens before this method as part of `unpack_in` will
+ // use canonicalization to ensure this guarantee. For hard
+ // links though they're canonicalized to their existing path
+ // so we need to validate at this time.
+ Some(ref p) => {
+ let link_src = p.join(src);
+ self.validate_inside_dst(p, &link_src)?;
+ link_src
+ }
+ None => src.into_owned(),
+ };
+ fs::hard_link(&link_src, dst).map_err(|err| {
+ Error::new(
+ err.kind(),
+ format!(
+ "{} when hard linking {} to {}",
+ err,
+ link_src.display(),
+ dst.display()
+ ),
+ )
+ })?;
+ } else {
+ symlink(&src, dst)
+ .or_else(|err_io| {
+ if err_io.kind() == io::ErrorKind::AlreadyExists && self.overwrite {
+ // remove dest and try once more
+ std::fs::remove_file(dst).and_then(|()| symlink(&src, dst))
+ } else {
+ Err(err_io)
+ }
+ })
+ .map_err(|err| {
+ Error::new(
+ err.kind(),
+ format!(
+ "{} when symlinking {} to {}",
+ err,
+ src.display(),
+ dst.display()
+ ),
+ )
+ })?;
+ if self.preserve_mtime {
+ if let Some(mtime) = get_mtime(&self.header) {
+ filetime::set_symlink_file_times(dst, mtime, mtime).map_err(|e| {
+ TarError::new(format!("failed to set mtime for `{}`", dst.display()), e)
+ })?;
+ }
+ }
+ }
+ return Ok(Unpacked::__Nonexhaustive);
+
+ #[cfg(target_arch = "wasm32")]
+ #[allow(unused_variables)]
+ fn symlink(src: &Path, dst: &Path) -> io::Result<()> {
+ Err(io::Error::new(io::ErrorKind::Other, "Not implemented"))
+ }
+
+ #[cfg(windows)]
+ fn symlink(src: &Path, dst: &Path) -> io::Result<()> {
+ ::std::os::windows::fs::symlink_file(src, dst)
+ }
+
+ #[cfg(unix)]
+ fn symlink(src: &Path, dst: &Path) -> io::Result<()> {
+ ::std::os::unix::fs::symlink(src, dst)
+ }
+ } else if kind.is_pax_global_extensions()
+ || kind.is_pax_local_extensions()
+ || kind.is_gnu_longname()
+ || kind.is_gnu_longlink()
+ {
+ return Ok(Unpacked::__Nonexhaustive);
+ };
+
+ // Old BSD-tar compatibility.
+ // Names that have a trailing slash should be treated as a directory.
+ // Only applies to old headers.
+ if self.header.as_ustar().is_none() && self.path_bytes().ends_with(b"/") {
+ self.unpack_dir(dst)?;
+ set_perms_ownerships(
+ dst,
+ None,
+ &self.header,
+ self.mask,
+ self.preserve_permissions,
+ self.preserve_ownerships,
+ )?;
+ return Ok(Unpacked::__Nonexhaustive);
+ }
+
+ // Note the lack of `else` clause above. According to the FreeBSD
+ // documentation:
+ //
+ // > A POSIX-compliant implementation must treat any unrecognized
+ // > typeflag value as a regular file.
+ //
+ // As a result if we don't recognize the kind we just write out the file
+ // as we would normally.
+
+ // Ensure we write a new file rather than overwriting in-place which
+ // is attackable; if an existing file is found unlink it.
+ fn open(dst: &Path) -> io::Result<std::fs::File> {
+ OpenOptions::new().write(true).create_new(true).open(dst)
+ }
+ let mut f = (|| -> io::Result<std::fs::File> {
+ let mut f = open(dst).or_else(|err| {
+ if err.kind() != ErrorKind::AlreadyExists {
+ Err(err)
+ } else if self.overwrite {
+ match fs::remove_file(dst) {
+ Ok(()) => open(dst),
+ Err(ref e) if e.kind() == io::ErrorKind::NotFound => open(dst),
+ Err(e) => Err(e),
+ }
+ } else {
+ Err(err)
+ }
+ })?;
+ for io in self.data.drain(..) {
+ match io {
+ EntryIo::Data(mut d) => {
+ let expected = d.limit();
+ if io::copy(&mut d, &mut f)? != expected {
+ return Err(other("failed to write entire file"));
+ }
+ }
+ EntryIo::Pad(d) => {
+ // TODO: checked cast to i64
+ let to = SeekFrom::Current(d.limit() as i64);
+ let size = f.seek(to)?;
+ f.set_len(size)?;
+ }
+ }
+ }
+ Ok(f)
+ })()
+ .map_err(|e| {
+ let header = self.header.path_bytes();
+ TarError::new(
+ format!(
+ "failed to unpack `{}` into `{}`",
+ String::from_utf8_lossy(&header),
+ dst.display()
+ ),
+ e,
+ )
+ })?;
+
+ if self.preserve_mtime {
+ if let Some(mtime) = get_mtime(&self.header) {
+ filetime::set_file_handle_times(&f, Some(mtime), Some(mtime)).map_err(|e| {
+ TarError::new(format!("failed to set mtime for `{}`", dst.display()), e)
+ })?;
+ }
+ }
+ set_perms_ownerships(
+ dst,
+ Some(&mut f),
+ &self.header,
+ self.mask,
+ self.preserve_permissions,
+ self.preserve_ownerships,
+ )?;
+ if self.unpack_xattrs {
+ set_xattrs(self, dst)?;
+ }
+ return Ok(Unpacked::File(f));
+
+ fn set_ownerships(
+ dst: &Path,
+ f: &Option<&mut std::fs::File>,
+ uid: u64,
+ gid: u64,
+ ) -> Result<(), TarError> {
+ _set_ownerships(dst, f, uid, gid).map_err(|e| {
+ TarError::new(
+ format!(
+ "failed to set ownerships to uid={:?}, gid={:?} \
+ for `{}`",
+ uid,
+ gid,
+ dst.display()
+ ),
+ e,
+ )
+ })
+ }
+
+ #[cfg(unix)]
+ fn _set_ownerships(
+ dst: &Path,
+ f: &Option<&mut std::fs::File>,
+ uid: u64,
+ gid: u64,
+ ) -> io::Result<()> {
+ use std::convert::TryInto;
+ use std::os::unix::prelude::*;
+
+ let uid: libc::uid_t = uid.try_into().map_err(|_| {
+ io::Error::new(io::ErrorKind::Other, format!("UID {} is too large!", uid))
+ })?;
+ let gid: libc::gid_t = gid.try_into().map_err(|_| {
+ io::Error::new(io::ErrorKind::Other, format!("GID {} is too large!", gid))
+ })?;
+ match f {
+ Some(f) => unsafe {
+ let fd = f.as_raw_fd();
+ if libc::fchown(fd, uid, gid) != 0 {
+ Err(io::Error::last_os_error())
+ } else {
+ Ok(())
+ }
+ },
+ None => unsafe {
+ let path = std::ffi::CString::new(dst.as_os_str().as_bytes()).map_err(|e| {
+ io::Error::new(
+ io::ErrorKind::Other,
+ format!("path contains null character: {:?}", e),
+ )
+ })?;
+ if libc::lchown(path.as_ptr(), uid, gid) != 0 {
+ Err(io::Error::last_os_error())
+ } else {
+ Ok(())
+ }
+ },
+ }
+ }
+
+ // Windows does not support posix numeric ownership IDs
+ #[cfg(any(windows, target_arch = "wasm32"))]
+ fn _set_ownerships(
+ _: &Path,
+ _: &Option<&mut std::fs::File>,
+ _: u64,
+ _: u64,
+ ) -> io::Result<()> {
+ Ok(())
+ }
+
+ fn set_perms(
+ dst: &Path,
+ f: Option<&mut std::fs::File>,
+ mode: u32,
+ mask: u32,
+ preserve: bool,
+ ) -> Result<(), TarError> {
+ _set_perms(dst, f, mode, mask, preserve).map_err(|e| {
+ TarError::new(
+ format!(
+ "failed to set permissions to {:o} \
+ for `{}`",
+ mode,
+ dst.display()
+ ),
+ e,
+ )
+ })
+ }
+
+ #[cfg(unix)]
+ fn _set_perms(
+ dst: &Path,
+ f: Option<&mut std::fs::File>,
+ mode: u32,
+ mask: u32,
+ preserve: bool,
+ ) -> io::Result<()> {
+ use std::os::unix::prelude::*;
+
+ let mode = if preserve { mode } else { mode & 0o777 };
+ let mode = mode & !mask;
+ let perm = fs::Permissions::from_mode(mode as _);
+ match f {
+ Some(f) => f.set_permissions(perm),
+ None => fs::set_permissions(dst, perm),
+ }
+ }
+
+ #[cfg(windows)]
+ fn _set_perms(
+ dst: &Path,
+ f: Option<&mut std::fs::File>,
+ mode: u32,
+ _mask: u32,
+ _preserve: bool,
+ ) -> io::Result<()> {
+ if mode & 0o200 == 0o200 {
+ return Ok(());
+ }
+ match f {
+ Some(f) => {
+ let mut perm = f.metadata()?.permissions();
+ perm.set_readonly(true);
+ f.set_permissions(perm)
+ }
+ None => {
+ let mut perm = fs::metadata(dst)?.permissions();
+ perm.set_readonly(true);
+ fs::set_permissions(dst, perm)
+ }
+ }
+ }
+
+ #[cfg(target_arch = "wasm32")]
+ #[allow(unused_variables)]
+ fn _set_perms(
+ dst: &Path,
+ f: Option<&mut std::fs::File>,
+ mode: u32,
+ mask: u32,
+ _preserve: bool,
+ ) -> io::Result<()> {
+ Err(io::Error::new(io::ErrorKind::Other, "Not implemented"))
+ }
+
+ #[cfg(all(unix, feature = "xattr"))]
+ fn set_xattrs(me: &mut EntryFields, dst: &Path) -> io::Result<()> {
+ use std::ffi::OsStr;
+ use std::os::unix::prelude::*;
+
+ let exts = match me.pax_extensions() {
+ Ok(Some(e)) => e,
+ _ => return Ok(()),
+ };
+ let exts = exts
+ .filter_map(|e| e.ok())
+ .filter_map(|e| {
+ let key = e.key_bytes();
+ let prefix = b"SCHILY.xattr.";
+ if key.starts_with(prefix) {
+ Some((&key[prefix.len()..], e))
+ } else {
+ None
+ }
+ })
+ .map(|(key, e)| (OsStr::from_bytes(key), e.value_bytes()));
+
+ for (key, value) in exts {
+ xattr::set(dst, key, value).map_err(|e| {
+ TarError::new(
+ format!(
+ "failed to set extended \
+ attributes to {}. \
+ Xattrs: key={:?}, value={:?}.",
+ dst.display(),
+ key,
+ String::from_utf8_lossy(value)
+ ),
+ e,
+ )
+ })?;
+ }
+
+ Ok(())
+ }
+ // Windows does not completely support posix xattrs
+ // https://en.wikipedia.org/wiki/Extended_file_attributes#Windows_NT
+ #[cfg(any(windows, not(feature = "xattr"), target_arch = "wasm32"))]
+ fn set_xattrs(_: &mut EntryFields, _: &Path) -> io::Result<()> {
+ Ok(())
+ }
+ }
+
+ fn ensure_dir_created(&self, dst: &Path, dir: &Path) -> io::Result<()> {
+ let mut ancestor = dir;
+ let mut dirs_to_create = Vec::new();
+ while ancestor.symlink_metadata().is_err() {
+ dirs_to_create.push(ancestor);
+ if let Some(parent) = ancestor.parent() {
+ ancestor = parent;
+ } else {
+ break;
+ }
+ }
+ for ancestor in dirs_to_create.into_iter().rev() {
+ if let Some(parent) = ancestor.parent() {
+ self.validate_inside_dst(dst, parent)?;
+ }
+ fs::create_dir_all(ancestor)?;
+ }
+ Ok(())
+ }
+
+ fn validate_inside_dst(&self, dst: &Path, file_dst: &Path) -> io::Result<PathBuf> {
+ // Abort if target (canonical) parent is outside of `dst`
+ let canon_parent = file_dst.canonicalize().map_err(|err| {
+ Error::new(
+ err.kind(),
+ format!("{} while canonicalizing {}", err, file_dst.display()),
+ )
+ })?;
+ let canon_target = dst.canonicalize().map_err(|err| {
+ Error::new(
+ err.kind(),
+ format!("{} while canonicalizing {}", err, dst.display()),
+ )
+ })?;
+ if !canon_parent.starts_with(&canon_target) {
+ let err = TarError::new(
+ format!(
+ "trying to unpack outside of destination path: {}",
+ canon_target.display()
+ ),
+ // TODO: use ErrorKind::InvalidInput here? (minor breaking change)
+ Error::new(ErrorKind::Other, "Invalid argument"),
+ );
+ return Err(err.into());
+ }
+ Ok(canon_target)
+ }
+}
+
+impl<'a> Read for EntryFields<'a> {
+ fn read(&mut self, into: &mut [u8]) -> io::Result<usize> {
+ loop {
+ match self.data.get_mut(0).map(|io| io.read(into)) {
+ Some(Ok(0)) => {
+ self.data.remove(0);
+ }
+ Some(r) => return r,
+ None => return Ok(0),
+ }
+ }
+ }
+}
+
+impl<'a> Read for EntryIo<'a> {
+ fn read(&mut self, into: &mut [u8]) -> io::Result<usize> {
+ match *self {
+ EntryIo::Pad(ref mut io) => io.read(into),
+ EntryIo::Data(ref mut io) => io.read(into),
+ }
+ }
+}
diff --git a/vendor/tar/src/entry_type.rs b/vendor/tar/src/entry_type.rs
new file mode 100644
index 0000000..951388d
--- /dev/null
+++ b/vendor/tar/src/entry_type.rs
@@ -0,0 +1,193 @@
+// See https://en.wikipedia.org/wiki/Tar_%28computing%29#UStar_format
+/// Indicate for the type of file described by a header.
+///
+/// Each `Header` has an `entry_type` method returning an instance of this type
+/// which can be used to inspect what the header is describing.
+
+/// A non-exhaustive enum representing the possible entry types
+#[derive(Clone, Copy, PartialEq, Eq, Debug)]
+pub enum EntryType {
+ /// Regular file
+ Regular,
+ /// Hard link
+ Link,
+ /// Symbolic link
+ Symlink,
+ /// Character device
+ Char,
+ /// Block device
+ Block,
+ /// Directory
+ Directory,
+ /// Named pipe (fifo)
+ Fifo,
+ /// Implementation-defined 'high-performance' type, treated as regular file
+ Continuous,
+ /// GNU extension - long file name
+ GNULongName,
+ /// GNU extension - long link name (link target)
+ GNULongLink,
+ /// GNU extension - sparse file
+ GNUSparse,
+ /// Global extended header
+ XGlobalHeader,
+ /// Extended Header
+ XHeader,
+ /// Hints that destructuring should not be exhaustive.
+ ///
+ /// This enum may grow additional variants, so this makes sure clients
+ /// don't count on exhaustive matching. (Otherwise, adding a new variant
+ /// could break existing code.)
+ #[doc(hidden)]
+ __Nonexhaustive(u8),
+}
+
+impl EntryType {
+ /// Creates a new entry type from a raw byte.
+ ///
+ /// Note that the other named constructors of entry type may be more
+ /// appropriate to create a file type from.
+ pub fn new(byte: u8) -> EntryType {
+ match byte {
+ b'\x00' | b'0' => EntryType::Regular,
+ b'1' => EntryType::Link,
+ b'2' => EntryType::Symlink,
+ b'3' => EntryType::Char,
+ b'4' => EntryType::Block,
+ b'5' => EntryType::Directory,
+ b'6' => EntryType::Fifo,
+ b'7' => EntryType::Continuous,
+ b'x' => EntryType::XHeader,
+ b'g' => EntryType::XGlobalHeader,
+ b'L' => EntryType::GNULongName,
+ b'K' => EntryType::GNULongLink,
+ b'S' => EntryType::GNUSparse,
+ b => EntryType::__Nonexhaustive(b),
+ }
+ }
+
+ /// Returns the raw underlying byte that this entry type represents.
+ pub fn as_byte(&self) -> u8 {
+ match *self {
+ EntryType::Regular => b'0',
+ EntryType::Link => b'1',
+ EntryType::Symlink => b'2',
+ EntryType::Char => b'3',
+ EntryType::Block => b'4',
+ EntryType::Directory => b'5',
+ EntryType::Fifo => b'6',
+ EntryType::Continuous => b'7',
+ EntryType::XHeader => b'x',
+ EntryType::XGlobalHeader => b'g',
+ EntryType::GNULongName => b'L',
+ EntryType::GNULongLink => b'K',
+ EntryType::GNUSparse => b'S',
+ EntryType::__Nonexhaustive(b) => b,
+ }
+ }
+
+ /// Creates a new entry type representing a regular file.
+ pub fn file() -> EntryType {
+ EntryType::Regular
+ }
+
+ /// Creates a new entry type representing a hard link.
+ pub fn hard_link() -> EntryType {
+ EntryType::Link
+ }
+
+ /// Creates a new entry type representing a symlink.
+ pub fn symlink() -> EntryType {
+ EntryType::Symlink
+ }
+
+ /// Creates a new entry type representing a character special device.
+ pub fn character_special() -> EntryType {
+ EntryType::Char
+ }
+
+ /// Creates a new entry type representing a block special device.
+ pub fn block_special() -> EntryType {
+ EntryType::Block
+ }
+
+ /// Creates a new entry type representing a directory.
+ pub fn dir() -> EntryType {
+ EntryType::Directory
+ }
+
+ /// Creates a new entry type representing a FIFO.
+ pub fn fifo() -> EntryType {
+ EntryType::Fifo
+ }
+
+ /// Creates a new entry type representing a contiguous file.
+ pub fn contiguous() -> EntryType {
+ EntryType::Continuous
+ }
+
+ /// Returns whether this type represents a regular file.
+ pub fn is_file(&self) -> bool {
+ self == &EntryType::Regular
+ }
+
+ /// Returns whether this type represents a hard link.
+ pub fn is_hard_link(&self) -> bool {
+ self == &EntryType::Link
+ }
+
+ /// Returns whether this type represents a symlink.
+ pub fn is_symlink(&self) -> bool {
+ self == &EntryType::Symlink
+ }
+
+ /// Returns whether this type represents a character special device.
+ pub fn is_character_special(&self) -> bool {
+ self == &EntryType::Char
+ }
+
+ /// Returns whether this type represents a block special device.
+ pub fn is_block_special(&self) -> bool {
+ self == &EntryType::Block
+ }
+
+ /// Returns whether this type represents a directory.
+ pub fn is_dir(&self) -> bool {
+ self == &EntryType::Directory
+ }
+
+ /// Returns whether this type represents a FIFO.
+ pub fn is_fifo(&self) -> bool {
+ self == &EntryType::Fifo
+ }
+
+ /// Returns whether this type represents a contiguous file.
+ pub fn is_contiguous(&self) -> bool {
+ self == &EntryType::Continuous
+ }
+
+ /// Returns whether this type represents a GNU long name header.
+ pub fn is_gnu_longname(&self) -> bool {
+ self == &EntryType::GNULongName
+ }
+
+ /// Returns whether this type represents a GNU sparse header.
+ pub fn is_gnu_sparse(&self) -> bool {
+ self == &EntryType::GNUSparse
+ }
+
+ /// Returns whether this type represents a GNU long link header.
+ pub fn is_gnu_longlink(&self) -> bool {
+ self == &EntryType::GNULongLink
+ }
+
+ /// Returns whether this type represents a GNU long name header.
+ pub fn is_pax_global_extensions(&self) -> bool {
+ self == &EntryType::XGlobalHeader
+ }
+
+ /// Returns whether this type represents a GNU long link header.
+ pub fn is_pax_local_extensions(&self) -> bool {
+ self == &EntryType::XHeader
+ }
+}
diff --git a/vendor/tar/src/error.rs b/vendor/tar/src/error.rs
new file mode 100644
index 0000000..0d3877f
--- /dev/null
+++ b/vendor/tar/src/error.rs
@@ -0,0 +1,41 @@
+use std::borrow::Cow;
+use std::error;
+use std::fmt;
+use std::io::{self, Error};
+
+#[derive(Debug)]
+pub struct TarError {
+ desc: Cow<'static, str>,
+ io: io::Error,
+}
+
+impl TarError {
+ pub fn new(desc: impl Into<Cow<'static, str>>, err: Error) -> TarError {
+ TarError {
+ desc: desc.into(),
+ io: err,
+ }
+ }
+}
+
+impl error::Error for TarError {
+ fn description(&self) -> &str {
+ &self.desc
+ }
+
+ fn source(&self) -> Option<&(dyn error::Error + 'static)> {
+ Some(&self.io)
+ }
+}
+
+impl fmt::Display for TarError {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ self.desc.fmt(f)
+ }
+}
+
+impl From<TarError> for Error {
+ fn from(t: TarError) -> Error {
+ Error::new(t.io.kind(), t)
+ }
+}
diff --git a/vendor/tar/src/header.rs b/vendor/tar/src/header.rs
new file mode 100644
index 0000000..7e507fc
--- /dev/null
+++ b/vendor/tar/src/header.rs
@@ -0,0 +1,1642 @@
+#[cfg(unix)]
+use std::os::unix::prelude::*;
+#[cfg(windows)]
+use std::os::windows::prelude::*;
+
+use std::borrow::Cow;
+use std::fmt;
+use std::fs;
+use std::io;
+use std::iter;
+use std::iter::repeat;
+use std::mem;
+use std::path::{Component, Path, PathBuf};
+use std::str;
+
+use crate::other;
+use crate::EntryType;
+
+/// Representation of the header of an entry in an archive
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct Header {
+ bytes: [u8; 512],
+}
+
+/// Declares the information that should be included when filling a Header
+/// from filesystem metadata.
+#[derive(Clone, Copy, PartialEq, Eq, Debug)]
+#[non_exhaustive]
+pub enum HeaderMode {
+ /// All supported metadata, including mod/access times and ownership will
+ /// be included.
+ Complete,
+
+ /// Only metadata that is directly relevant to the identity of a file will
+ /// be included. In particular, ownership and mod/access times are excluded.
+ Deterministic,
+}
+
+/// Representation of the header of an entry in an archive
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct OldHeader {
+ pub name: [u8; 100],
+ pub mode: [u8; 8],
+ pub uid: [u8; 8],
+ pub gid: [u8; 8],
+ pub size: [u8; 12],
+ pub mtime: [u8; 12],
+ pub cksum: [u8; 8],
+ pub linkflag: [u8; 1],
+ pub linkname: [u8; 100],
+ pub pad: [u8; 255],
+}
+
+/// Representation of the header of an entry in an archive
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct UstarHeader {
+ pub name: [u8; 100],
+ pub mode: [u8; 8],
+ pub uid: [u8; 8],
+ pub gid: [u8; 8],
+ pub size: [u8; 12],
+ pub mtime: [u8; 12],
+ pub cksum: [u8; 8],
+ pub typeflag: [u8; 1],
+ pub linkname: [u8; 100],
+
+ // UStar format
+ pub magic: [u8; 6],
+ pub version: [u8; 2],
+ pub uname: [u8; 32],
+ pub gname: [u8; 32],
+ pub dev_major: [u8; 8],
+ pub dev_minor: [u8; 8],
+ pub prefix: [u8; 155],
+ pub pad: [u8; 12],
+}
+
+/// Representation of the header of an entry in an archive
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct GnuHeader {
+ pub name: [u8; 100],
+ pub mode: [u8; 8],
+ pub uid: [u8; 8],
+ pub gid: [u8; 8],
+ pub size: [u8; 12],
+ pub mtime: [u8; 12],
+ pub cksum: [u8; 8],
+ pub typeflag: [u8; 1],
+ pub linkname: [u8; 100],
+
+ // GNU format
+ pub magic: [u8; 6],
+ pub version: [u8; 2],
+ pub uname: [u8; 32],
+ pub gname: [u8; 32],
+ pub dev_major: [u8; 8],
+ pub dev_minor: [u8; 8],
+ pub atime: [u8; 12],
+ pub ctime: [u8; 12],
+ pub offset: [u8; 12],
+ pub longnames: [u8; 4],
+ pub unused: [u8; 1],
+ pub sparse: [GnuSparseHeader; 4],
+ pub isextended: [u8; 1],
+ pub realsize: [u8; 12],
+ pub pad: [u8; 17],
+}
+
+/// Description of the header of a spare entry.
+///
+/// Specifies the offset/number of bytes of a chunk of data in octal.
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct GnuSparseHeader {
+ pub offset: [u8; 12],
+ pub numbytes: [u8; 12],
+}
+
+/// Representation of the entry found to represent extended GNU sparse files.
+///
+/// When a `GnuHeader` has the `isextended` flag set to `1` then the contents of
+/// the next entry will be one of these headers.
+#[repr(C)]
+#[allow(missing_docs)]
+pub struct GnuExtSparseHeader {
+ pub sparse: [GnuSparseHeader; 21],
+ pub isextended: [u8; 1],
+ pub padding: [u8; 7],
+}
+
+impl Header {
+ /// Creates a new blank GNU header.
+ ///
+ /// The GNU style header is the default for this library and allows various
+ /// extensions such as long path names, long link names, and setting the
+ /// atime/ctime metadata attributes of files.
+ pub fn new_gnu() -> Header {
+ let mut header = Header { bytes: [0; 512] };
+ unsafe {
+ let gnu = cast_mut::<_, GnuHeader>(&mut header);
+ gnu.magic = *b"ustar ";
+ gnu.version = *b" \0";
+ }
+ header.set_mtime(0);
+ header
+ }
+
+ /// Creates a new blank UStar header.
+ ///
+ /// The UStar style header is an extension of the original archive header
+ /// which enables some extra metadata along with storing a longer (but not
+ /// too long) path name.
+ ///
+ /// UStar is also the basis used for pax archives.
+ pub fn new_ustar() -> Header {
+ let mut header = Header { bytes: [0; 512] };
+ unsafe {
+ let gnu = cast_mut::<_, UstarHeader>(&mut header);
+ gnu.magic = *b"ustar\0";
+ gnu.version = *b"00";
+ }
+ header.set_mtime(0);
+ header
+ }
+
+ /// Creates a new blank old header.
+ ///
+ /// This header format is the original archive header format which all other
+ /// versions are compatible with (e.g. they are a superset). This header
+ /// format limits the path name limit and isn't able to contain extra
+ /// metadata like atime/ctime.
+ pub fn new_old() -> Header {
+ let mut header = Header { bytes: [0; 512] };
+ header.set_mtime(0);
+ header
+ }
+
+ fn is_ustar(&self) -> bool {
+ let ustar = unsafe { cast::<_, UstarHeader>(self) };
+ ustar.magic[..] == b"ustar\0"[..] && ustar.version[..] == b"00"[..]
+ }
+
+ fn is_gnu(&self) -> bool {
+ let ustar = unsafe { cast::<_, UstarHeader>(self) };
+ ustar.magic[..] == b"ustar "[..] && ustar.version[..] == b" \0"[..]
+ }
+
+ /// View this archive header as a raw "old" archive header.
+ ///
+ /// This view will always succeed as all archive header formats will fill
+ /// out at least the fields specified in the old header format.
+ pub fn as_old(&self) -> &OldHeader {
+ unsafe { cast(self) }
+ }
+
+ /// Same as `as_old`, but the mutable version.
+ pub fn as_old_mut(&mut self) -> &mut OldHeader {
+ unsafe { cast_mut(self) }
+ }
+
+ /// View this archive header as a raw UStar archive header.
+ ///
+ /// The UStar format is an extension to the tar archive format which enables
+ /// longer pathnames and a few extra attributes such as the group and user
+ /// name.
+ ///
+ /// This cast may not succeed as this function will test whether the
+ /// magic/version fields of the UStar format have the appropriate values,
+ /// returning `None` if they aren't correct.
+ pub fn as_ustar(&self) -> Option<&UstarHeader> {
+ if self.is_ustar() {
+ Some(unsafe { cast(self) })
+ } else {
+ None
+ }
+ }
+
+ /// Same as `as_ustar_mut`, but the mutable version.
+ pub fn as_ustar_mut(&mut self) -> Option<&mut UstarHeader> {
+ if self.is_ustar() {
+ Some(unsafe { cast_mut(self) })
+ } else {
+ None
+ }
+ }
+
+ /// View this archive header as a raw GNU archive header.
+ ///
+ /// The GNU format is an extension to the tar archive format which enables
+ /// longer pathnames and a few extra attributes such as the group and user
+ /// name.
+ ///
+ /// This cast may not succeed as this function will test whether the
+ /// magic/version fields of the GNU format have the appropriate values,
+ /// returning `None` if they aren't correct.
+ pub fn as_gnu(&self) -> Option<&GnuHeader> {
+ if self.is_gnu() {
+ Some(unsafe { cast(self) })
+ } else {
+ None
+ }
+ }
+
+ /// Same as `as_gnu`, but the mutable version.
+ pub fn as_gnu_mut(&mut self) -> Option<&mut GnuHeader> {
+ if self.is_gnu() {
+ Some(unsafe { cast_mut(self) })
+ } else {
+ None
+ }
+ }
+
+ /// Treats the given byte slice as a header.
+ ///
+ /// Panics if the length of the passed slice is not equal to 512.
+ pub fn from_byte_slice(bytes: &[u8]) -> &Header {
+ assert_eq!(bytes.len(), mem::size_of::<Header>());
+ assert_eq!(mem::align_of_val(bytes), mem::align_of::<Header>());
+ unsafe { &*(bytes.as_ptr() as *const Header) }
+ }
+
+ /// Returns a view into this header as a byte array.
+ pub fn as_bytes(&self) -> &[u8; 512] {
+ &self.bytes
+ }
+
+ /// Returns a view into this header as a byte array.
+ pub fn as_mut_bytes(&mut self) -> &mut [u8; 512] {
+ &mut self.bytes
+ }
+
+ /// Blanket sets the metadata in this header from the metadata argument
+ /// provided.
+ ///
+ /// This is useful for initializing a `Header` from the OS's metadata from a
+ /// file. By default, this will use `HeaderMode::Complete` to include all
+ /// metadata.
+ pub fn set_metadata(&mut self, meta: &fs::Metadata) {
+ self.fill_from(meta, HeaderMode::Complete);
+ }
+
+ /// Sets only the metadata relevant to the given HeaderMode in this header
+ /// from the metadata argument provided.
+ pub fn set_metadata_in_mode(&mut self, meta: &fs::Metadata, mode: HeaderMode) {
+ self.fill_from(meta, mode);
+ }
+
+ /// Returns the size of entry's data this header represents.
+ ///
+ /// This is different from `Header::size` for sparse files, which have
+ /// some longer `size()` but shorter `entry_size()`. The `entry_size()`
+ /// listed here should be the number of bytes in the archive this header
+ /// describes.
+ ///
+ /// May return an error if the field is corrupted.
+ pub fn entry_size(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.as_old().size).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting size for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Returns the file size this header represents.
+ ///
+ /// May return an error if the field is corrupted.
+ pub fn size(&self) -> io::Result<u64> {
+ if self.entry_type().is_gnu_sparse() {
+ self.as_gnu()
+ .ok_or_else(|| other("sparse header was not a gnu header"))
+ .and_then(|h| h.real_size())
+ } else {
+ self.entry_size()
+ }
+ }
+
+ /// Encodes the `size` argument into the size field of this header.
+ pub fn set_size(&mut self, size: u64) {
+ num_field_wrapper_into(&mut self.as_old_mut().size, size);
+ }
+
+ /// Returns the raw path name stored in this header.
+ ///
+ /// This method may fail if the pathname is not valid Unicode and this is
+ /// called on a Windows platform.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators.
+ pub fn path(&self) -> io::Result<Cow<Path>> {
+ bytes2path(self.path_bytes())
+ }
+
+ /// Returns the pathname stored in this header as a byte array.
+ ///
+ /// This function is guaranteed to succeed, but you may wish to call the
+ /// `path` method to convert to a `Path`.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators.
+ pub fn path_bytes(&self) -> Cow<[u8]> {
+ if let Some(ustar) = self.as_ustar() {
+ ustar.path_bytes()
+ } else {
+ let name = truncate(&self.as_old().name);
+ Cow::Borrowed(name)
+ }
+ }
+
+ /// Gets the path in a "lossy" way, used for error reporting ONLY.
+ fn path_lossy(&self) -> String {
+ String::from_utf8_lossy(&self.path_bytes()).to_string()
+ }
+
+ /// Sets the path name for this header.
+ ///
+ /// This function will set the pathname listed in this header, encoding it
+ /// in the appropriate format. May fail if the path is too long or if the
+ /// path specified is not Unicode and this is a Windows platform. Will
+ /// strip out any "." path component, which signifies the current directory.
+ ///
+ /// Note: This function does not support names over 100 bytes, or paths
+ /// over 255 bytes, even for formats that support longer names. Instead,
+ /// use `Builder` methods to insert a long-name extension at the same time
+ /// as the file content.
+ pub fn set_path<P: AsRef<Path>>(&mut self, p: P) -> io::Result<()> {
+ self._set_path(p.as_ref())
+ }
+
+ fn _set_path(&mut self, path: &Path) -> io::Result<()> {
+ if let Some(ustar) = self.as_ustar_mut() {
+ return ustar.set_path(path);
+ }
+ copy_path_into(&mut self.as_old_mut().name, path, false).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting path for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Returns the link name stored in this header, if any is found.
+ ///
+ /// This method may fail if the pathname is not valid Unicode and this is
+ /// called on a Windows platform. `Ok(None)` being returned, however,
+ /// indicates that the link name was not present.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators.
+ pub fn link_name(&self) -> io::Result<Option<Cow<Path>>> {
+ match self.link_name_bytes() {
+ Some(bytes) => bytes2path(bytes).map(Some),
+ None => Ok(None),
+ }
+ }
+
+ /// Returns the link name stored in this header as a byte array, if any.
+ ///
+ /// This function is guaranteed to succeed, but you may wish to call the
+ /// `link_name` method to convert to a `Path`.
+ ///
+ /// Note that this function will convert any `\` characters to directory
+ /// separators.
+ pub fn link_name_bytes(&self) -> Option<Cow<[u8]>> {
+ let old = self.as_old();
+ if old.linkname[0] != 0 {
+ Some(Cow::Borrowed(truncate(&old.linkname)))
+ } else {
+ None
+ }
+ }
+
+ /// Sets the link name for this header.
+ ///
+ /// This function will set the linkname listed in this header, encoding it
+ /// in the appropriate format. May fail if the link name is too long or if
+ /// the path specified is not Unicode and this is a Windows platform. Will
+ /// strip out any "." path component, which signifies the current directory.
+ ///
+ /// To use GNU long link names, prefer instead [`crate::Builder::append_link`].
+ pub fn set_link_name<P: AsRef<Path>>(&mut self, p: P) -> io::Result<()> {
+ self._set_link_name(p.as_ref())
+ }
+
+ fn _set_link_name(&mut self, path: &Path) -> io::Result<()> {
+ copy_path_into(&mut self.as_old_mut().linkname, path, true).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting link name for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Sets the link name for this header without any transformation.
+ ///
+ /// This function is like [`Self::set_link_name`] but accepts an arbitrary byte array.
+ /// Hence it will not perform any canonicalization, such as replacing duplicate `//` with `/`.
+ pub fn set_link_name_literal<P: AsRef<[u8]>>(&mut self, p: P) -> io::Result<()> {
+ self._set_link_name_literal(p.as_ref())
+ }
+
+ fn _set_link_name_literal(&mut self, bytes: &[u8]) -> io::Result<()> {
+ copy_into(&mut self.as_old_mut().linkname, bytes)
+ }
+
+ /// Returns the mode bits for this file
+ ///
+ /// May return an error if the field is corrupted.
+ pub fn mode(&self) -> io::Result<u32> {
+ octal_from(&self.as_old().mode)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting mode for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `mode` provided into this header.
+ pub fn set_mode(&mut self, mode: u32) {
+ octal_into(&mut self.as_old_mut().mode, mode);
+ }
+
+ /// Returns the value of the owner's user ID field
+ ///
+ /// May return an error if the field is corrupted.
+ pub fn uid(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.as_old().uid)
+ .map(|u| u as u64)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting uid for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `uid` provided into this header.
+ pub fn set_uid(&mut self, uid: u64) {
+ num_field_wrapper_into(&mut self.as_old_mut().uid, uid);
+ }
+
+ /// Returns the value of the group's user ID field
+ pub fn gid(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.as_old().gid)
+ .map(|u| u as u64)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting gid for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `gid` provided into this header.
+ pub fn set_gid(&mut self, gid: u64) {
+ num_field_wrapper_into(&mut self.as_old_mut().gid, gid);
+ }
+
+ /// Returns the last modification time in Unix time format
+ pub fn mtime(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.as_old().mtime).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting mtime for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `mtime` provided into this header.
+ ///
+ /// Note that this time is typically a number of seconds passed since
+ /// January 1, 1970.
+ pub fn set_mtime(&mut self, mtime: u64) {
+ num_field_wrapper_into(&mut self.as_old_mut().mtime, mtime);
+ }
+
+ /// Return the user name of the owner of this file.
+ ///
+ /// A return value of `Ok(Some(..))` indicates that the user name was
+ /// present and was valid utf-8, `Ok(None)` indicates that the user name is
+ /// not present in this archive format, and `Err` indicates that the user
+ /// name was present but was not valid utf-8.
+ pub fn username(&self) -> Result<Option<&str>, str::Utf8Error> {
+ match self.username_bytes() {
+ Some(bytes) => str::from_utf8(bytes).map(Some),
+ None => Ok(None),
+ }
+ }
+
+ /// Returns the user name of the owner of this file, if present.
+ ///
+ /// A return value of `None` indicates that the user name is not present in
+ /// this header format.
+ pub fn username_bytes(&self) -> Option<&[u8]> {
+ if let Some(ustar) = self.as_ustar() {
+ Some(ustar.username_bytes())
+ } else if let Some(gnu) = self.as_gnu() {
+ Some(gnu.username_bytes())
+ } else {
+ None
+ }
+ }
+
+ /// Sets the username inside this header.
+ ///
+ /// This function will return an error if this header format cannot encode a
+ /// user name or the name is too long.
+ pub fn set_username(&mut self, name: &str) -> io::Result<()> {
+ if let Some(ustar) = self.as_ustar_mut() {
+ return ustar.set_username(name);
+ }
+ if let Some(gnu) = self.as_gnu_mut() {
+ gnu.set_username(name)
+ } else {
+ Err(other("not a ustar or gnu archive, cannot set username"))
+ }
+ }
+
+ /// Return the group name of the owner of this file.
+ ///
+ /// A return value of `Ok(Some(..))` indicates that the group name was
+ /// present and was valid utf-8, `Ok(None)` indicates that the group name is
+ /// not present in this archive format, and `Err` indicates that the group
+ /// name was present but was not valid utf-8.
+ pub fn groupname(&self) -> Result<Option<&str>, str::Utf8Error> {
+ match self.groupname_bytes() {
+ Some(bytes) => str::from_utf8(bytes).map(Some),
+ None => Ok(None),
+ }
+ }
+
+ /// Returns the group name of the owner of this file, if present.
+ ///
+ /// A return value of `None` indicates that the group name is not present in
+ /// this header format.
+ pub fn groupname_bytes(&self) -> Option<&[u8]> {
+ if let Some(ustar) = self.as_ustar() {
+ Some(ustar.groupname_bytes())
+ } else if let Some(gnu) = self.as_gnu() {
+ Some(gnu.groupname_bytes())
+ } else {
+ None
+ }
+ }
+
+ /// Sets the group name inside this header.
+ ///
+ /// This function will return an error if this header format cannot encode a
+ /// group name or the name is too long.
+ pub fn set_groupname(&mut self, name: &str) -> io::Result<()> {
+ if let Some(ustar) = self.as_ustar_mut() {
+ return ustar.set_groupname(name);
+ }
+ if let Some(gnu) = self.as_gnu_mut() {
+ gnu.set_groupname(name)
+ } else {
+ Err(other("not a ustar or gnu archive, cannot set groupname"))
+ }
+ }
+
+ /// Returns the device major number, if present.
+ ///
+ /// This field may not be present in all archives, and it may not be
+ /// correctly formed in all archives. `Ok(Some(..))` means it was present
+ /// and correctly decoded, `Ok(None)` indicates that this header format does
+ /// not include the device major number, and `Err` indicates that it was
+ /// present and failed to decode.
+ pub fn device_major(&self) -> io::Result<Option<u32>> {
+ if let Some(ustar) = self.as_ustar() {
+ ustar.device_major().map(Some)
+ } else if let Some(gnu) = self.as_gnu() {
+ gnu.device_major().map(Some)
+ } else {
+ Ok(None)
+ }
+ }
+
+ /// Encodes the value `major` into the dev_major field of this header.
+ ///
+ /// This function will return an error if this header format cannot encode a
+ /// major device number.
+ pub fn set_device_major(&mut self, major: u32) -> io::Result<()> {
+ if let Some(ustar) = self.as_ustar_mut() {
+ ustar.set_device_major(major);
+ Ok(())
+ } else if let Some(gnu) = self.as_gnu_mut() {
+ gnu.set_device_major(major);
+ Ok(())
+ } else {
+ Err(other("not a ustar or gnu archive, cannot set dev_major"))
+ }
+ }
+
+ /// Returns the device minor number, if present.
+ ///
+ /// This field may not be present in all archives, and it may not be
+ /// correctly formed in all archives. `Ok(Some(..))` means it was present
+ /// and correctly decoded, `Ok(None)` indicates that this header format does
+ /// not include the device minor number, and `Err` indicates that it was
+ /// present and failed to decode.
+ pub fn device_minor(&self) -> io::Result<Option<u32>> {
+ if let Some(ustar) = self.as_ustar() {
+ ustar.device_minor().map(Some)
+ } else if let Some(gnu) = self.as_gnu() {
+ gnu.device_minor().map(Some)
+ } else {
+ Ok(None)
+ }
+ }
+
+ /// Encodes the value `minor` into the dev_minor field of this header.
+ ///
+ /// This function will return an error if this header format cannot encode a
+ /// minor device number.
+ pub fn set_device_minor(&mut self, minor: u32) -> io::Result<()> {
+ if let Some(ustar) = self.as_ustar_mut() {
+ ustar.set_device_minor(minor);
+ Ok(())
+ } else if let Some(gnu) = self.as_gnu_mut() {
+ gnu.set_device_minor(minor);
+ Ok(())
+ } else {
+ Err(other("not a ustar or gnu archive, cannot set dev_minor"))
+ }
+ }
+
+ /// Returns the type of file described by this header.
+ pub fn entry_type(&self) -> EntryType {
+ EntryType::new(self.as_old().linkflag[0])
+ }
+
+ /// Sets the type of file that will be described by this header.
+ pub fn set_entry_type(&mut self, ty: EntryType) {
+ self.as_old_mut().linkflag = [ty.as_byte()];
+ }
+
+ /// Returns the checksum field of this header.
+ ///
+ /// May return an error if the field is corrupted.
+ pub fn cksum(&self) -> io::Result<u32> {
+ octal_from(&self.as_old().cksum)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting cksum for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// Sets the checksum field of this header based on the current fields in
+ /// this header.
+ pub fn set_cksum(&mut self) {
+ let cksum = self.calculate_cksum();
+ octal_into(&mut self.as_old_mut().cksum, cksum);
+ }
+
+ fn calculate_cksum(&self) -> u32 {
+ let old = self.as_old();
+ let start = old as *const _ as usize;
+ let cksum_start = old.cksum.as_ptr() as *const _ as usize;
+ let offset = cksum_start - start;
+ let len = old.cksum.len();
+ self.bytes[0..offset]
+ .iter()
+ .chain(iter::repeat(&b' ').take(len))
+ .chain(&self.bytes[offset + len..])
+ .fold(0, |a, b| a + (*b as u32))
+ }
+
+ fn fill_from(&mut self, meta: &fs::Metadata, mode: HeaderMode) {
+ self.fill_platform_from(meta, mode);
+ // Set size of directories to zero
+ self.set_size(if meta.is_dir() || meta.file_type().is_symlink() {
+ 0
+ } else {
+ meta.len()
+ });
+ if let Some(ustar) = self.as_ustar_mut() {
+ ustar.set_device_major(0);
+ ustar.set_device_minor(0);
+ }
+ if let Some(gnu) = self.as_gnu_mut() {
+ gnu.set_device_major(0);
+ gnu.set_device_minor(0);
+ }
+ }
+
+ #[cfg(target_arch = "wasm32")]
+ #[allow(unused_variables)]
+ fn fill_platform_from(&mut self, meta: &fs::Metadata, mode: HeaderMode) {
+ unimplemented!();
+ }
+
+ #[cfg(unix)]
+ fn fill_platform_from(&mut self, meta: &fs::Metadata, mode: HeaderMode) {
+ match mode {
+ HeaderMode::Complete => {
+ self.set_mtime(meta.mtime() as u64);
+ self.set_uid(meta.uid() as u64);
+ self.set_gid(meta.gid() as u64);
+ self.set_mode(meta.mode() as u32);
+ }
+ HeaderMode::Deterministic => {
+ // We could in theory set the mtime to zero here, but not all
+ // tools seem to behave well when ingesting files with a 0
+ // timestamp. For example rust-lang/cargo#9512 shows that lldb
+ // doesn't ingest files with a zero timestamp correctly.
+ //
+ // We just need things to be deterministic here so just pick
+ // something that isn't zero. This time, chosen after careful
+ // deliberation, corresponds to Jul 23, 2006 -- the date of the
+ // first commit for what would become Rust.
+ self.set_mtime(1153704088);
+
+ self.set_uid(0);
+ self.set_gid(0);
+
+ // Use a default umask value, but propagate the (user) execute bit.
+ let fs_mode = if meta.is_dir() || (0o100 & meta.mode() == 0o100) {
+ 0o755
+ } else {
+ 0o644
+ };
+ self.set_mode(fs_mode);
+ }
+ }
+
+ // Note that if we are a GNU header we *could* set atime/ctime, except
+ // the `tar` utility doesn't do that by default and it causes problems
+ // with 7-zip [1].
+ //
+ // It's always possible to fill them out manually, so we just don't fill
+ // it out automatically here.
+ //
+ // [1]: https://github.com/alexcrichton/tar-rs/issues/70
+
+ // TODO: need to bind more file types
+ self.set_entry_type(entry_type(meta.mode()));
+
+ fn entry_type(mode: u32) -> EntryType {
+ match mode as libc::mode_t & libc::S_IFMT {
+ libc::S_IFREG => EntryType::file(),
+ libc::S_IFLNK => EntryType::symlink(),
+ libc::S_IFCHR => EntryType::character_special(),
+ libc::S_IFBLK => EntryType::block_special(),
+ libc::S_IFDIR => EntryType::dir(),
+ libc::S_IFIFO => EntryType::fifo(),
+ _ => EntryType::new(b' '),
+ }
+ }
+ }
+
+ #[cfg(windows)]
+ fn fill_platform_from(&mut self, meta: &fs::Metadata, mode: HeaderMode) {
+ // There's no concept of a file mode on Windows, so do a best approximation here.
+ match mode {
+ HeaderMode::Complete => {
+ self.set_uid(0);
+ self.set_gid(0);
+ // The dates listed in tarballs are always seconds relative to
+ // January 1, 1970. On Windows, however, the timestamps are returned as
+ // dates relative to January 1, 1601 (in 100ns intervals), so we need to
+ // add in some offset for those dates.
+ let mtime = (meta.last_write_time() / (1_000_000_000 / 100)) - 11644473600;
+ self.set_mtime(mtime);
+ let fs_mode = {
+ const FILE_ATTRIBUTE_READONLY: u32 = 0x00000001;
+ let readonly = meta.file_attributes() & FILE_ATTRIBUTE_READONLY;
+ match (meta.is_dir(), readonly != 0) {
+ (true, false) => 0o755,
+ (true, true) => 0o555,
+ (false, false) => 0o644,
+ (false, true) => 0o444,
+ }
+ };
+ self.set_mode(fs_mode);
+ }
+ HeaderMode::Deterministic => {
+ self.set_uid(0);
+ self.set_gid(0);
+ self.set_mtime(123456789); // see above in unix
+ let fs_mode = if meta.is_dir() { 0o755 } else { 0o644 };
+ self.set_mode(fs_mode);
+ }
+ }
+
+ let ft = meta.file_type();
+ self.set_entry_type(if ft.is_dir() {
+ EntryType::dir()
+ } else if ft.is_file() {
+ EntryType::file()
+ } else if ft.is_symlink() {
+ EntryType::symlink()
+ } else {
+ EntryType::new(b' ')
+ });
+ }
+
+ fn debug_fields(&self, b: &mut fmt::DebugStruct) {
+ if let Ok(entry_size) = self.entry_size() {
+ b.field("entry_size", &entry_size);
+ }
+ if let Ok(size) = self.size() {
+ b.field("size", &size);
+ }
+ if let Ok(path) = self.path() {
+ b.field("path", &path);
+ }
+ if let Ok(link_name) = self.link_name() {
+ b.field("link_name", &link_name);
+ }
+ if let Ok(mode) = self.mode() {
+ b.field("mode", &DebugAsOctal(mode));
+ }
+ if let Ok(uid) = self.uid() {
+ b.field("uid", &uid);
+ }
+ if let Ok(gid) = self.gid() {
+ b.field("gid", &gid);
+ }
+ if let Ok(mtime) = self.mtime() {
+ b.field("mtime", &mtime);
+ }
+ if let Ok(username) = self.username() {
+ b.field("username", &username);
+ }
+ if let Ok(groupname) = self.groupname() {
+ b.field("groupname", &groupname);
+ }
+ if let Ok(device_major) = self.device_major() {
+ b.field("device_major", &device_major);
+ }
+ if let Ok(device_minor) = self.device_minor() {
+ b.field("device_minor", &device_minor);
+ }
+ if let Ok(cksum) = self.cksum() {
+ b.field("cksum", &cksum);
+ b.field("cksum_valid", &(cksum == self.calculate_cksum()));
+ }
+ }
+}
+
+struct DebugAsOctal<T>(T);
+
+impl<T: fmt::Octal> fmt::Debug for DebugAsOctal<T> {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ fmt::Octal::fmt(&self.0, f)
+ }
+}
+
+unsafe fn cast<T, U>(a: &T) -> &U {
+ assert_eq!(mem::size_of_val(a), mem::size_of::<U>());
+ assert_eq!(mem::align_of_val(a), mem::align_of::<U>());
+ &*(a as *const T as *const U)
+}
+
+unsafe fn cast_mut<T, U>(a: &mut T) -> &mut U {
+ assert_eq!(mem::size_of_val(a), mem::size_of::<U>());
+ assert_eq!(mem::align_of_val(a), mem::align_of::<U>());
+ &mut *(a as *mut T as *mut U)
+}
+
+impl Clone for Header {
+ fn clone(&self) -> Header {
+ Header { bytes: self.bytes }
+ }
+}
+
+impl fmt::Debug for Header {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ if let Some(me) = self.as_ustar() {
+ me.fmt(f)
+ } else if let Some(me) = self.as_gnu() {
+ me.fmt(f)
+ } else {
+ self.as_old().fmt(f)
+ }
+ }
+}
+
+impl OldHeader {
+ /// Views this as a normal `Header`
+ pub fn as_header(&self) -> &Header {
+ unsafe { cast(self) }
+ }
+
+ /// Views this as a normal `Header`
+ pub fn as_header_mut(&mut self) -> &mut Header {
+ unsafe { cast_mut(self) }
+ }
+}
+
+impl fmt::Debug for OldHeader {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ let mut f = f.debug_struct("OldHeader");
+ self.as_header().debug_fields(&mut f);
+ f.finish()
+ }
+}
+
+impl UstarHeader {
+ /// See `Header::path_bytes`
+ pub fn path_bytes(&self) -> Cow<[u8]> {
+ if self.prefix[0] == 0 && !self.name.contains(&b'\\') {
+ Cow::Borrowed(truncate(&self.name))
+ } else {
+ let mut bytes = Vec::new();
+ let prefix = truncate(&self.prefix);
+ if !prefix.is_empty() {
+ bytes.extend_from_slice(prefix);
+ bytes.push(b'/');
+ }
+ bytes.extend_from_slice(truncate(&self.name));
+ Cow::Owned(bytes)
+ }
+ }
+
+ /// Gets the path in a "lossy" way, used for error reporting ONLY.
+ fn path_lossy(&self) -> String {
+ String::from_utf8_lossy(&self.path_bytes()).to_string()
+ }
+
+ /// See `Header::set_path`
+ pub fn set_path<P: AsRef<Path>>(&mut self, p: P) -> io::Result<()> {
+ self._set_path(p.as_ref())
+ }
+
+ fn _set_path(&mut self, path: &Path) -> io::Result<()> {
+ // This can probably be optimized quite a bit more, but for now just do
+ // something that's relatively easy and readable.
+ //
+ // First up, if the path fits within `self.name` then we just shove it
+ // in there. If not then we try to split it between some existing path
+ // components where it can fit in name/prefix. To do that we peel off
+ // enough until the path fits in `prefix`, then we try to put both
+ // halves into their destination.
+ let bytes = path2bytes(path)?;
+ let (maxnamelen, maxprefixlen) = (self.name.len(), self.prefix.len());
+ if bytes.len() <= maxnamelen {
+ copy_path_into(&mut self.name, path, false).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting path for {}", err, self.path_lossy()),
+ )
+ })?;
+ } else {
+ let mut prefix = path;
+ let mut prefixlen;
+ loop {
+ match prefix.parent() {
+ Some(parent) => prefix = parent,
+ None => {
+ return Err(other(&format!(
+ "path cannot be split to be inserted into archive: {}",
+ path.display()
+ )));
+ }
+ }
+ prefixlen = path2bytes(prefix)?.len();
+ if prefixlen <= maxprefixlen {
+ break;
+ }
+ }
+ copy_path_into(&mut self.prefix, prefix, false).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting path for {}", err, self.path_lossy()),
+ )
+ })?;
+ let path = bytes2path(Cow::Borrowed(&bytes[prefixlen + 1..]))?;
+ copy_path_into(&mut self.name, &path, false).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting path for {}", err, self.path_lossy()),
+ )
+ })?;
+ }
+ Ok(())
+ }
+
+ /// See `Header::username_bytes`
+ pub fn username_bytes(&self) -> &[u8] {
+ truncate(&self.uname)
+ }
+
+ /// See `Header::set_username`
+ pub fn set_username(&mut self, name: &str) -> io::Result<()> {
+ copy_into(&mut self.uname, name.as_bytes()).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting username for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// See `Header::groupname_bytes`
+ pub fn groupname_bytes(&self) -> &[u8] {
+ truncate(&self.gname)
+ }
+
+ /// See `Header::set_groupname`
+ pub fn set_groupname(&mut self, name: &str) -> io::Result<()> {
+ copy_into(&mut self.gname, name.as_bytes()).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when setting groupname for {}", err, self.path_lossy()),
+ )
+ })
+ }
+
+ /// See `Header::device_major`
+ pub fn device_major(&self) -> io::Result<u32> {
+ octal_from(&self.dev_major)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when getting device_major for {}",
+ err,
+ self.path_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::set_device_major`
+ pub fn set_device_major(&mut self, major: u32) {
+ octal_into(&mut self.dev_major, major);
+ }
+
+ /// See `Header::device_minor`
+ pub fn device_minor(&self) -> io::Result<u32> {
+ octal_from(&self.dev_minor)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when getting device_minor for {}",
+ err,
+ self.path_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::set_device_minor`
+ pub fn set_device_minor(&mut self, minor: u32) {
+ octal_into(&mut self.dev_minor, minor);
+ }
+
+ /// Views this as a normal `Header`
+ pub fn as_header(&self) -> &Header {
+ unsafe { cast(self) }
+ }
+
+ /// Views this as a normal `Header`
+ pub fn as_header_mut(&mut self) -> &mut Header {
+ unsafe { cast_mut(self) }
+ }
+}
+
+impl fmt::Debug for UstarHeader {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ let mut f = f.debug_struct("UstarHeader");
+ self.as_header().debug_fields(&mut f);
+ f.finish()
+ }
+}
+
+impl GnuHeader {
+ /// See `Header::username_bytes`
+ pub fn username_bytes(&self) -> &[u8] {
+ truncate(&self.uname)
+ }
+
+ /// Gets the fullname (group:user) in a "lossy" way, used for error reporting ONLY.
+ fn fullname_lossy(&self) -> String {
+ format!(
+ "{}:{}",
+ String::from_utf8_lossy(self.groupname_bytes()),
+ String::from_utf8_lossy(self.username_bytes()),
+ )
+ }
+
+ /// See `Header::set_username`
+ pub fn set_username(&mut self, name: &str) -> io::Result<()> {
+ copy_into(&mut self.uname, name.as_bytes()).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when setting username for {}",
+ err,
+ self.fullname_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::groupname_bytes`
+ pub fn groupname_bytes(&self) -> &[u8] {
+ truncate(&self.gname)
+ }
+
+ /// See `Header::set_groupname`
+ pub fn set_groupname(&mut self, name: &str) -> io::Result<()> {
+ copy_into(&mut self.gname, name.as_bytes()).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when setting groupname for {}",
+ err,
+ self.fullname_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::device_major`
+ pub fn device_major(&self) -> io::Result<u32> {
+ octal_from(&self.dev_major)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when getting device_major for {}",
+ err,
+ self.fullname_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::set_device_major`
+ pub fn set_device_major(&mut self, major: u32) {
+ octal_into(&mut self.dev_major, major);
+ }
+
+ /// See `Header::device_minor`
+ pub fn device_minor(&self) -> io::Result<u32> {
+ octal_from(&self.dev_minor)
+ .map(|u| u as u32)
+ .map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when getting device_minor for {}",
+ err,
+ self.fullname_lossy()
+ ),
+ )
+ })
+ }
+
+ /// See `Header::set_device_minor`
+ pub fn set_device_minor(&mut self, minor: u32) {
+ octal_into(&mut self.dev_minor, minor);
+ }
+
+ /// Returns the last modification time in Unix time format
+ pub fn atime(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.atime).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting atime for {}", err, self.fullname_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `atime` provided into this header.
+ ///
+ /// Note that this time is typically a number of seconds passed since
+ /// January 1, 1970.
+ pub fn set_atime(&mut self, atime: u64) {
+ num_field_wrapper_into(&mut self.atime, atime);
+ }
+
+ /// Returns the last modification time in Unix time format
+ pub fn ctime(&self) -> io::Result<u64> {
+ num_field_wrapper_from(&self.ctime).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting ctime for {}", err, self.fullname_lossy()),
+ )
+ })
+ }
+
+ /// Encodes the `ctime` provided into this header.
+ ///
+ /// Note that this time is typically a number of seconds passed since
+ /// January 1, 1970.
+ pub fn set_ctime(&mut self, ctime: u64) {
+ num_field_wrapper_into(&mut self.ctime, ctime);
+ }
+
+ /// Returns the "real size" of the file this header represents.
+ ///
+ /// This is applicable for sparse files where the returned size here is the
+ /// size of the entire file after the sparse regions have been filled in.
+ pub fn real_size(&self) -> io::Result<u64> {
+ octal_from(&self.realsize).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!(
+ "{} when getting real_size for {}",
+ err,
+ self.fullname_lossy()
+ ),
+ )
+ })
+ }
+
+ /// Indicates whether this header will be followed by additional
+ /// sparse-header records.
+ ///
+ /// Note that this is handled internally by this library, and is likely only
+ /// interesting if a `raw` iterator is being used.
+ pub fn is_extended(&self) -> bool {
+ self.isextended[0] == 1
+ }
+
+ /// Views this as a normal `Header`
+ pub fn as_header(&self) -> &Header {
+ unsafe { cast(self) }
+ }
+
+ /// Views this as a normal `Header`
+ pub fn as_header_mut(&mut self) -> &mut Header {
+ unsafe { cast_mut(self) }
+ }
+}
+
+impl fmt::Debug for GnuHeader {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ let mut f = f.debug_struct("GnuHeader");
+ self.as_header().debug_fields(&mut f);
+ if let Ok(atime) = self.atime() {
+ f.field("atime", &atime);
+ }
+ if let Ok(ctime) = self.ctime() {
+ f.field("ctime", &ctime);
+ }
+ f.field("is_extended", &self.is_extended())
+ .field("sparse", &DebugSparseHeaders(&self.sparse))
+ .finish()
+ }
+}
+
+struct DebugSparseHeaders<'a>(&'a [GnuSparseHeader]);
+
+impl<'a> fmt::Debug for DebugSparseHeaders<'a> {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ let mut f = f.debug_list();
+ for header in self.0 {
+ if !header.is_empty() {
+ f.entry(header);
+ }
+ }
+ f.finish()
+ }
+}
+
+impl GnuSparseHeader {
+ /// Returns true if block is empty
+ pub fn is_empty(&self) -> bool {
+ self.offset[0] == 0 || self.numbytes[0] == 0
+ }
+
+ /// Offset of the block from the start of the file
+ ///
+ /// Returns `Err` for a malformed `offset` field.
+ pub fn offset(&self) -> io::Result<u64> {
+ octal_from(&self.offset).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting offset from sparse header", err),
+ )
+ })
+ }
+
+ /// Length of the block
+ ///
+ /// Returns `Err` for a malformed `numbytes` field.
+ pub fn length(&self) -> io::Result<u64> {
+ octal_from(&self.numbytes).map_err(|err| {
+ io::Error::new(
+ err.kind(),
+ format!("{} when getting length from sparse header", err),
+ )
+ })
+ }
+}
+
+impl fmt::Debug for GnuSparseHeader {
+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
+ let mut f = f.debug_struct("GnuSparseHeader");
+ if let Ok(offset) = self.offset() {
+ f.field("offset", &offset);
+ }
+ if let Ok(length) = self.length() {
+ f.field("length", &length);
+ }
+ f.finish()
+ }
+}
+
+impl GnuExtSparseHeader {
+ /// Crates a new zero'd out sparse header entry.
+ pub fn new() -> GnuExtSparseHeader {
+ unsafe { mem::zeroed() }
+ }
+
+ /// Returns a view into this header as a byte array.
+ pub fn as_bytes(&self) -> &[u8; 512] {
+ debug_assert_eq!(mem::size_of_val(self), 512);
+ unsafe { mem::transmute(self) }
+ }
+
+ /// Returns a view into this header as a byte array.
+ pub fn as_mut_bytes(&mut self) -> &mut [u8; 512] {
+ debug_assert_eq!(mem::size_of_val(self), 512);
+ unsafe { mem::transmute(self) }
+ }
+
+ /// Returns a slice of the underlying sparse headers.
+ ///
+ /// Some headers may represent empty chunks of both the offset and numbytes
+ /// fields are 0.
+ pub fn sparse(&self) -> &[GnuSparseHeader; 21] {
+ &self.sparse
+ }
+
+ /// Indicates if another sparse header should be following this one.
+ pub fn is_extended(&self) -> bool {
+ self.isextended[0] == 1
+ }
+}
+
+impl Default for GnuExtSparseHeader {
+ fn default() -> Self {
+ Self::new()
+ }
+}
+
+fn octal_from(slice: &[u8]) -> io::Result<u64> {
+ let trun = truncate(slice);
+ let num = match str::from_utf8(trun) {
+ Ok(n) => n,
+ Err(_) => {
+ return Err(other(&format!(
+ "numeric field did not have utf-8 text: {}",
+ String::from_utf8_lossy(trun)
+ )));
+ }
+ };
+ match u64::from_str_radix(num.trim(), 8) {
+ Ok(n) => Ok(n),
+ Err(_) => Err(other(&format!("numeric field was not a number: {}", num))),
+ }
+}
+
+fn octal_into<T: fmt::Octal>(dst: &mut [u8], val: T) {
+ let o = format!("{:o}", val);
+ let value = o.bytes().rev().chain(repeat(b'0'));
+ for (slot, value) in dst.iter_mut().rev().skip(1).zip(value) {
+ *slot = value;
+ }
+}
+
+// Wrapper to figure out if we should fill the header field using tar's numeric
+// extension (binary) or not (octal).
+fn num_field_wrapper_into(dst: &mut [u8], src: u64) {
+ if src >= 8589934592 || (src >= 2097152 && dst.len() == 8) {
+ numeric_extended_into(dst, src);
+ } else {
+ octal_into(dst, src);
+ }
+}
+
+// Wrapper to figure out if we should read the header field in binary (numeric
+// extension) or octal (standard encoding).
+fn num_field_wrapper_from(src: &[u8]) -> io::Result<u64> {
+ if src[0] & 0x80 != 0 {
+ Ok(numeric_extended_from(src))
+ } else {
+ octal_from(src)
+ }
+}
+
+// When writing numeric fields with is the extended form, the high bit of the
+// first byte is set to 1 and the remainder of the field is treated as binary
+// instead of octal ascii.
+// This handles writing u64 to 8 (uid, gid) or 12 (size, *time) bytes array.
+fn numeric_extended_into(dst: &mut [u8], src: u64) {
+ let len: usize = dst.len();
+ for (slot, val) in dst.iter_mut().zip(
+ repeat(0)
+ .take(len - 8) // to zero init extra bytes
+ .chain((0..8).rev().map(|x| ((src >> (8 * x)) & 0xff) as u8)),
+ ) {
+ *slot = val;
+ }
+ dst[0] |= 0x80;
+}
+
+fn numeric_extended_from(src: &[u8]) -> u64 {
+ let mut dst: u64 = 0;
+ let mut b_to_skip = 1;
+ if src.len() == 8 {
+ // read first byte without extension flag bit
+ dst = (src[0] ^ 0x80) as u64;
+ } else {
+ // only read last 8 bytes
+ b_to_skip = src.len() - 8;
+ }
+ for byte in src.iter().skip(b_to_skip) {
+ dst <<= 8;
+ dst |= *byte as u64;
+ }
+ dst
+}
+
+fn truncate(slice: &[u8]) -> &[u8] {
+ match slice.iter().position(|i| *i == 0) {
+ Some(i) => &slice[..i],
+ None => slice,
+ }
+}
+
+/// Copies `bytes` into the `slot` provided, returning an error if the `bytes`
+/// array is too long or if it contains any nul bytes.
+fn copy_into(slot: &mut [u8], bytes: &[u8]) -> io::Result<()> {
+ if bytes.len() > slot.len() {
+ Err(other("provided value is too long"))
+ } else if bytes.iter().any(|b| *b == 0) {
+ Err(other("provided value contains a nul byte"))
+ } else {
+ for (slot, val) in slot.iter_mut().zip(bytes.iter().chain(Some(&0))) {
+ *slot = *val;
+ }
+ Ok(())
+ }
+}
+
+/// Copies `path` into the `slot` provided
+///
+/// Returns an error if:
+///
+/// * the path is too long to fit
+/// * a nul byte was found
+/// * an invalid path component is encountered (e.g. a root path or parent dir)
+/// * the path itself is empty
+fn copy_path_into(mut slot: &mut [u8], path: &Path, is_link_name: bool) -> io::Result<()> {
+ let mut emitted = false;
+ let mut needs_slash = false;
+ for component in path.components() {
+ let bytes = path2bytes(Path::new(component.as_os_str()))?;
+ match (component, is_link_name) {
+ (Component::Prefix(..), false) | (Component::RootDir, false) => {
+ return Err(other("paths in archives must be relative"));
+ }
+ (Component::ParentDir, false) => {
+ return Err(other("paths in archives must not have `..`"));
+ }
+ // Allow "./" as the path
+ (Component::CurDir, false) if path.components().count() == 1 => {}
+ (Component::CurDir, false) => continue,
+ (Component::Normal(_), _) | (_, true) => {}
+ };
+ if needs_slash {
+ copy(&mut slot, b"/")?;
+ }
+ if bytes.contains(&b'/') {
+ if let Component::Normal(..) = component {
+ return Err(other("path component in archive cannot contain `/`"));
+ }
+ }
+ copy(&mut slot, &*bytes)?;
+ if &*bytes != b"/" {
+ needs_slash = true;
+ }
+ emitted = true;
+ }
+ if !emitted {
+ return Err(other("paths in archives must have at least one component"));
+ }
+ if ends_with_slash(path) {
+ copy(&mut slot, &[b'/'])?;
+ }
+ return Ok(());
+
+ fn copy(slot: &mut &mut [u8], bytes: &[u8]) -> io::Result<()> {
+ copy_into(*slot, bytes)?;
+ let tmp = mem::replace(slot, &mut []);
+ *slot = &mut tmp[bytes.len()..];
+ Ok(())
+ }
+}
+
+#[cfg(target_arch = "wasm32")]
+fn ends_with_slash(p: &Path) -> bool {
+ p.to_string_lossy().ends_with('/')
+}
+
+#[cfg(windows)]
+fn ends_with_slash(p: &Path) -> bool {
+ let last = p.as_os_str().encode_wide().last();
+ last == Some(b'/' as u16) || last == Some(b'\\' as u16)
+}
+
+#[cfg(unix)]
+fn ends_with_slash(p: &Path) -> bool {
+ p.as_os_str().as_bytes().ends_with(&[b'/'])
+}
+
+#[cfg(any(windows, target_arch = "wasm32"))]
+pub fn path2bytes(p: &Path) -> io::Result<Cow<[u8]>> {
+ p.as_os_str()
+ .to_str()
+ .map(|s| s.as_bytes())
+ .ok_or_else(|| other(&format!("path {} was not valid Unicode", p.display())))
+ .map(|bytes| {
+ if bytes.contains(&b'\\') {
+ // Normalize to Unix-style path separators
+ let mut bytes = bytes.to_owned();
+ for b in &mut bytes {
+ if *b == b'\\' {
+ *b = b'/';
+ }
+ }
+ Cow::Owned(bytes)
+ } else {
+ Cow::Borrowed(bytes)
+ }
+ })
+}
+
+#[cfg(unix)]
+/// On unix this will never fail
+pub fn path2bytes(p: &Path) -> io::Result<Cow<[u8]>> {
+ Ok(p.as_os_str().as_bytes()).map(Cow::Borrowed)
+}
+
+#[cfg(windows)]
+/// On windows we cannot accept non-Unicode bytes because it
+/// is impossible to convert it to UTF-16.
+pub fn bytes2path(bytes: Cow<[u8]>) -> io::Result<Cow<Path>> {
+ return match bytes {
+ Cow::Borrowed(bytes) => {
+ let s = str::from_utf8(bytes).map_err(|_| not_unicode(bytes))?;
+ Ok(Cow::Borrowed(Path::new(s)))
+ }
+ Cow::Owned(bytes) => {
+ let s = String::from_utf8(bytes).map_err(|uerr| not_unicode(&uerr.into_bytes()))?;
+ Ok(Cow::Owned(PathBuf::from(s)))
+ }
+ };
+
+ fn not_unicode(v: &[u8]) -> io::Error {
+ other(&format!(
+ "only Unicode paths are supported on Windows: {}",
+ String::from_utf8_lossy(v)
+ ))
+ }
+}
+
+#[cfg(unix)]
+/// On unix this operation can never fail.
+pub fn bytes2path(bytes: Cow<[u8]>) -> io::Result<Cow<Path>> {
+ use std::ffi::{OsStr, OsString};
+
+ Ok(match bytes {
+ Cow::Borrowed(bytes) => Cow::Borrowed(Path::new(OsStr::from_bytes(bytes))),
+ Cow::Owned(bytes) => Cow::Owned(PathBuf::from(OsString::from_vec(bytes))),
+ })
+}
+
+#[cfg(target_arch = "wasm32")]
+pub fn bytes2path(bytes: Cow<[u8]>) -> io::Result<Cow<Path>> {
+ Ok(match bytes {
+ Cow::Borrowed(bytes) => {
+ Cow::Borrowed({ Path::new(str::from_utf8(bytes).map_err(invalid_utf8)?) })
+ }
+ Cow::Owned(bytes) => {
+ Cow::Owned({ PathBuf::from(String::from_utf8(bytes).map_err(invalid_utf8)?) })
+ }
+ })
+}
+
+#[cfg(target_arch = "wasm32")]
+fn invalid_utf8<T>(_: T) -> io::Error {
+ io::Error::new(io::ErrorKind::InvalidData, "Invalid utf-8")
+}
diff --git a/vendor/tar/src/lib.rs b/vendor/tar/src/lib.rs
new file mode 100644
index 0000000..52251cd
--- /dev/null
+++ b/vendor/tar/src/lib.rs
@@ -0,0 +1,44 @@
+//! A library for reading and writing TAR archives
+//!
+//! This library provides utilities necessary to manage [TAR archives][1]
+//! abstracted over a reader or writer. Great strides are taken to ensure that
+//! an archive is never required to be fully resident in memory, and all objects
+//! provide largely a streaming interface to read bytes from.
+//!
+//! [1]: http://en.wikipedia.org/wiki/Tar_%28computing%29
+
+// More docs about the detailed tar format can also be found here:
+// http://www.freebsd.org/cgi/man.cgi?query=tar&sektion=5&manpath=FreeBSD+8-current
+
+// NB: some of the coding patterns and idioms here may seem a little strange.
+// This is currently attempting to expose a super generic interface while
+// also not forcing clients to codegen the entire crate each time they use
+// it. To that end lots of work is done to ensure that concrete
+// implementations are all found in this crate and the generic functions are
+// all just super thin wrappers (e.g. easy to codegen).
+
+#![doc(html_root_url = "https://docs.rs/tar/0.4")]
+#![deny(missing_docs)]
+#![cfg_attr(test, deny(warnings))]
+
+use std::io::{Error, ErrorKind};
+
+pub use crate::archive::{Archive, Entries};
+pub use crate::builder::Builder;
+pub use crate::entry::{Entry, Unpacked};
+pub use crate::entry_type::EntryType;
+pub use crate::header::GnuExtSparseHeader;
+pub use crate::header::{GnuHeader, GnuSparseHeader, Header, HeaderMode, OldHeader, UstarHeader};
+pub use crate::pax::{PaxExtension, PaxExtensions};
+
+mod archive;
+mod builder;
+mod entry;
+mod entry_type;
+mod error;
+mod header;
+mod pax;
+
+fn other(msg: &str) -> Error {
+ Error::new(ErrorKind::Other, msg)
+}
diff --git a/vendor/tar/src/pax.rs b/vendor/tar/src/pax.rs
new file mode 100644
index 0000000..6e83edc
--- /dev/null
+++ b/vendor/tar/src/pax.rs
@@ -0,0 +1,147 @@
+#![allow(dead_code)]
+use std::io;
+use std::slice;
+use std::str;
+
+use crate::other;
+
+// Keywords for PAX extended header records.
+pub const PAX_NONE: &str = ""; // Indicates that no PAX key is suitable
+pub const PAX_PATH: &str = "path";
+pub const PAX_LINKPATH: &str = "linkpath";
+pub const PAX_SIZE: &str = "size";
+pub const PAX_UID: &str = "uid";
+pub const PAX_GID: &str = "gid";
+pub const PAX_UNAME: &str = "uname";
+pub const PAX_GNAME: &str = "gname";
+pub const PAX_MTIME: &str = "mtime";
+pub const PAX_ATIME: &str = "atime";
+pub const PAX_CTIME: &str = "ctime"; // Removed from later revision of PAX spec, but was valid
+pub const PAX_CHARSET: &str = "charset"; // Currently unused
+pub const PAX_COMMENT: &str = "comment"; // Currently unused
+
+pub const PAX_SCHILYXATTR: &str = "SCHILY.xattr.";
+
+// Keywords for GNU sparse files in a PAX extended header.
+pub const PAX_GNUSPARSE: &str = "GNU.sparse.";
+pub const PAX_GNUSPARSENUMBLOCKS: &str = "GNU.sparse.numblocks";
+pub const PAX_GNUSPARSEOFFSET: &str = "GNU.sparse.offset";
+pub const PAX_GNUSPARSENUMBYTES: &str = "GNU.sparse.numbytes";
+pub const PAX_GNUSPARSEMAP: &str = "GNU.sparse.map";
+pub const PAX_GNUSPARSENAME: &str = "GNU.sparse.name";
+pub const PAX_GNUSPARSEMAJOR: &str = "GNU.sparse.major";
+pub const PAX_GNUSPARSEMINOR: &str = "GNU.sparse.minor";
+pub const PAX_GNUSPARSESIZE: &str = "GNU.sparse.size";
+pub const PAX_GNUSPARSEREALSIZE: &str = "GNU.sparse.realsize";
+
+/// An iterator over the pax extensions in an archive entry.
+///
+/// This iterator yields structures which can themselves be parsed into
+/// key/value pairs.
+pub struct PaxExtensions<'entry> {
+ data: slice::Split<'entry, u8, fn(&u8) -> bool>,
+}
+
+impl<'entry> PaxExtensions<'entry> {
+ /// Create new pax extensions iterator from the given entry data.
+ pub fn new(a: &'entry [u8]) -> Self {
+ fn is_newline(a: &u8) -> bool {
+ *a == b'\n'
+ }
+ PaxExtensions {
+ data: a.split(is_newline),
+ }
+ }
+}
+
+/// A key/value pair corresponding to a pax extension.
+pub struct PaxExtension<'entry> {
+ key: &'entry [u8],
+ value: &'entry [u8],
+}
+
+pub fn pax_extensions_value(a: &[u8], key: &str) -> Option<u64> {
+ for extension in PaxExtensions::new(a) {
+ let current_extension = match extension {
+ Ok(ext) => ext,
+ Err(_) => return None,
+ };
+ if current_extension.key() != Ok(key) {
+ continue;
+ }
+
+ let value = match current_extension.value() {
+ Ok(value) => value,
+ Err(_) => return None,
+ };
+ let result = match value.parse::<u64>() {
+ Ok(result) => result,
+ Err(_) => return None,
+ };
+ return Some(result);
+ }
+ None
+}
+
+impl<'entry> Iterator for PaxExtensions<'entry> {
+ type Item = io::Result<PaxExtension<'entry>>;
+
+ fn next(&mut self) -> Option<io::Result<PaxExtension<'entry>>> {
+ let line = match self.data.next() {
+ Some(line) if line.is_empty() => return None,
+ Some(line) => line,
+ None => return None,
+ };
+
+ Some(
+ line.iter()
+ .position(|b| *b == b' ')
+ .and_then(|i| {
+ str::from_utf8(&line[..i])
+ .ok()
+ .and_then(|len| len.parse::<usize>().ok().map(|j| (i + 1, j)))
+ })
+ .and_then(|(kvstart, reported_len)| {
+ if line.len() + 1 == reported_len {
+ line[kvstart..]
+ .iter()
+ .position(|b| *b == b'=')
+ .map(|equals| (kvstart, equals))
+ } else {
+ None
+ }
+ })
+ .map(|(kvstart, equals)| PaxExtension {
+ key: &line[kvstart..kvstart + equals],
+ value: &line[kvstart + equals + 1..],
+ })
+ .ok_or_else(|| other("malformed pax extension")),
+ )
+ }
+}
+
+impl<'entry> PaxExtension<'entry> {
+ /// Returns the key for this key/value pair parsed as a string.
+ ///
+ /// May fail if the key isn't actually utf-8.
+ pub fn key(&self) -> Result<&'entry str, str::Utf8Error> {
+ str::from_utf8(self.key)
+ }
+
+ /// Returns the underlying raw bytes for the key of this key/value pair.
+ pub fn key_bytes(&self) -> &'entry [u8] {
+ self.key
+ }
+
+ /// Returns the value for this key/value pair parsed as a string.
+ ///
+ /// May fail if the value isn't actually utf-8.
+ pub fn value(&self) -> Result<&'entry str, str::Utf8Error> {
+ str::from_utf8(self.value)
+ }
+
+ /// Returns the underlying raw bytes for this value of this key/value pair.
+ pub fn value_bytes(&self) -> &'entry [u8] {
+ self.value
+ }
+}
diff --git a/vendor/tar/tests/all.rs b/vendor/tar/tests/all.rs
new file mode 100644
index 0000000..9ba6766
--- /dev/null
+++ b/vendor/tar/tests/all.rs
@@ -0,0 +1,1525 @@
+extern crate filetime;
+extern crate tar;
+extern crate tempfile;
+#[cfg(all(unix, feature = "xattr"))]
+extern crate xattr;
+
+use std::fs::{self, File};
+use std::io::prelude::*;
+use std::io::{self, Cursor};
+use std::iter::repeat;
+use std::path::{Path, PathBuf};
+
+use filetime::FileTime;
+use tar::{Archive, Builder, Entries, EntryType, Header, HeaderMode};
+use tempfile::{Builder as TempBuilder, TempDir};
+
+macro_rules! t {
+ ($e:expr) => {
+ match $e {
+ Ok(v) => v,
+ Err(e) => panic!("{} returned {}", stringify!($e), e),
+ }
+ };
+}
+
+/*macro_rules! tar {
+ ($e:expr) => {
+ &include_bytes!(concat!("archives/", $e))[..]
+ };
+}*/
+
+mod header;
+
+/// test that we can concatenate the simple.tar archive and extract the same entries twice when we
+/// use the ignore_zeros option.
+/*#[test]
+fn simple_concat() {
+ let bytes = tar!("simple.tar");
+ let mut archive_bytes = Vec::new();
+ archive_bytes.extend(bytes);
+
+ let original_names: Vec<String> = decode_names(&mut Archive::new(Cursor::new(&archive_bytes)));
+ let expected: Vec<&str> = original_names.iter().map(|n| n.as_str()).collect();
+
+ // concat two archives (with null in-between);
+ archive_bytes.extend(bytes);
+
+ // test now that when we read the archive, it stops processing at the first zero header.
+ let actual = decode_names(&mut Archive::new(Cursor::new(&archive_bytes)));
+ assert_eq!(expected, actual);
+
+ // extend expected by itself.
+ let expected: Vec<&str> = {
+ let mut o = Vec::new();
+ o.extend(&expected);
+ o.extend(&expected);
+ o
+ };
+
+ let mut ar = Archive::new(Cursor::new(&archive_bytes));
+ ar.set_ignore_zeros(true);
+
+ let actual = decode_names(&mut ar);
+ assert_eq!(expected, actual);
+
+ fn decode_names<R>(ar: &mut Archive<R>) -> Vec<String>
+ where
+ R: Read,
+ {
+ let mut names = Vec::new();
+
+ for entry in t!(ar.entries()) {
+ let e = t!(entry);
+ names.push(t!(::std::str::from_utf8(&e.path_bytes())).to_string());
+ }
+
+ names
+ }
+}*/
+
+/*#[test]
+fn header_impls() {
+ let mut ar = Archive::new(Cursor::new(tar!("simple.tar")));
+ let hn = Header::new_old();
+ let hnb = hn.as_bytes();
+ for file in t!(ar.entries()) {
+ let file = t!(file);
+ let h1 = file.header();
+ let h1b = h1.as_bytes();
+ let h2 = h1.clone();
+ let h2b = h2.as_bytes();
+ assert!(h1b[..] == h2b[..] && h2b[..] != hnb[..])
+ }
+}*/
+
+/*#[test]
+fn header_impls_missing_last_header() {
+ let mut ar = Archive::new(Cursor::new(tar!("simple_missing_last_header.tar")));
+ let hn = Header::new_old();
+ let hnb = hn.as_bytes();
+ for file in t!(ar.entries()) {
+ let file = t!(file);
+ let h1 = file.header();
+ let h1b = h1.as_bytes();
+ let h2 = h1.clone();
+ let h2b = h2.as_bytes();
+ assert!(h1b[..] == h2b[..] && h2b[..] != hnb[..])
+ }
+}*/
+
+/*#[test]
+fn reading_files() {
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+ let mut entries = t!(ar.entries());
+
+ let mut a = t!(entries.next().unwrap());
+ assert_eq!(&*a.header().path_bytes(), b"a");
+ let mut s = String::new();
+ t!(a.read_to_string(&mut s));
+ assert_eq!(s, "a\na\na\na\na\na\na\na\na\na\na\n");
+
+ let mut b = t!(entries.next().unwrap());
+ assert_eq!(&*b.header().path_bytes(), b"b");
+ s.truncate(0);
+ t!(b.read_to_string(&mut s));
+ assert_eq!(s, "b\nb\nb\nb\nb\nb\nb\nb\nb\nb\nb\n");
+
+ assert!(entries.next().is_none());
+}*/
+
+#[test]
+fn writing_files() {
+ let mut ar = Builder::new(Vec::new());
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let path = td.path().join("test");
+ t!(t!(File::create(&path)).write_all(b"test"));
+
+ t!(ar.append_file("test2", &mut t!(File::open(&path))));
+
+ let data = t!(ar.into_inner());
+ let mut ar = Archive::new(Cursor::new(data));
+ let mut entries = t!(ar.entries());
+ let mut f = t!(entries.next().unwrap());
+
+ assert_eq!(&*f.header().path_bytes(), b"test2");
+ assert_eq!(f.header().size().unwrap(), 4);
+ let mut s = String::new();
+ t!(f.read_to_string(&mut s));
+ assert_eq!(s, "test");
+
+ assert!(entries.next().is_none());
+}
+
+#[test]
+fn large_filename() {
+ let mut ar = Builder::new(Vec::new());
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let path = td.path().join("test");
+ t!(t!(File::create(&path)).write_all(b"test"));
+
+ let filename = repeat("abcd/").take(50).collect::<String>();
+ let mut header = Header::new_ustar();
+ header.set_path(&filename).unwrap();
+ header.set_metadata(&t!(fs::metadata(&path)));
+ header.set_cksum();
+ t!(ar.append(&header, &b"test"[..]));
+ let too_long = repeat("abcd").take(200).collect::<String>();
+ t!(ar.append_file(&too_long, &mut t!(File::open(&path))));
+ t!(ar.append_data(&mut header, &too_long, &b"test"[..]));
+
+ let rd = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rd);
+ let mut entries = t!(ar.entries());
+
+ // The short entry added with `append`
+ let mut f = entries.next().unwrap().unwrap();
+ assert_eq!(&*f.header().path_bytes(), filename.as_bytes());
+ assert_eq!(f.header().size().unwrap(), 4);
+ let mut s = String::new();
+ t!(f.read_to_string(&mut s));
+ assert_eq!(s, "test");
+
+ // The long entry added with `append_file`
+ let mut f = entries.next().unwrap().unwrap();
+ assert_eq!(&*f.path_bytes(), too_long.as_bytes());
+ assert_eq!(f.header().size().unwrap(), 4);
+ let mut s = String::new();
+ t!(f.read_to_string(&mut s));
+ assert_eq!(s, "test");
+
+ // The long entry added with `append_data`
+ let mut f = entries.next().unwrap().unwrap();
+ assert!(f.header().path_bytes().len() < too_long.len());
+ assert_eq!(&*f.path_bytes(), too_long.as_bytes());
+ assert_eq!(f.header().size().unwrap(), 4);
+ let mut s = String::new();
+ t!(f.read_to_string(&mut s));
+ assert_eq!(s, "test");
+
+ assert!(entries.next().is_none());
+}
+
+fn reading_entries_common<R: Read>(mut entries: Entries<R>) {
+ let mut a = t!(entries.next().unwrap());
+ assert_eq!(&*a.header().path_bytes(), b"a");
+ let mut s = String::new();
+ t!(a.read_to_string(&mut s));
+ assert_eq!(s, "a\na\na\na\na\na\na\na\na\na\na\n");
+ s.truncate(0);
+ t!(a.read_to_string(&mut s));
+ assert_eq!(s, "");
+
+ let mut b = t!(entries.next().unwrap());
+ assert_eq!(&*b.header().path_bytes(), b"b");
+ s.truncate(0);
+ t!(b.read_to_string(&mut s));
+ assert_eq!(s, "b\nb\nb\nb\nb\nb\nb\nb\nb\nb\nb\n");
+ assert!(entries.next().is_none());
+}
+
+/*#[test]
+fn reading_entries() {
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+ reading_entries_common(t!(ar.entries()));
+}
+
+#[test]
+fn reading_entries_with_seek() {
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+ reading_entries_common(t!(ar.entries_with_seek()));
+}
+*/
+
+struct LoggingReader<R> {
+ inner: R,
+ read_bytes: u64,
+}
+
+impl<R> LoggingReader<R> {
+ fn new(reader: R) -> LoggingReader<R> {
+ LoggingReader {
+ inner: reader,
+ read_bytes: 0,
+ }
+ }
+}
+
+impl<T: Read> Read for LoggingReader<T> {
+ fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
+ self.inner.read(buf).map(|i| {
+ self.read_bytes += i as u64;
+ i
+ })
+ }
+}
+
+impl<T: Seek> Seek for LoggingReader<T> {
+ fn seek(&mut self, pos: io::SeekFrom) -> io::Result<u64> {
+ self.inner.seek(pos)
+ }
+}
+
+/*
+#[test]
+fn skipping_entries_with_seek() {
+ let mut reader = LoggingReader::new(Cursor::new(tar!("reading_files.tar")));
+ let mut ar_reader = Archive::new(&mut reader);
+ let files: Vec<_> = t!(ar_reader.entries())
+ .map(|entry| entry.unwrap().path().unwrap().to_path_buf())
+ .collect();
+
+ let mut seekable_reader = LoggingReader::new(Cursor::new(tar!("reading_files.tar")));
+ let mut ar_seekable_reader = Archive::new(&mut seekable_reader);
+ let files_seekable: Vec<_> = t!(ar_seekable_reader.entries_with_seek())
+ .map(|entry| entry.unwrap().path().unwrap().to_path_buf())
+ .collect();
+
+ assert!(files == files_seekable);
+ assert!(seekable_reader.read_bytes < reader.read_bytes);
+}
+*/
+
+fn check_dirtree(td: &TempDir) {
+ let dir_a = td.path().join("a");
+ let dir_b = td.path().join("a/b");
+ let file_c = td.path().join("a/c");
+ assert!(fs::metadata(&dir_a).map(|m| m.is_dir()).unwrap_or(false));
+ assert!(fs::metadata(&dir_b).map(|m| m.is_dir()).unwrap_or(false));
+ assert!(fs::metadata(&file_c).map(|m| m.is_file()).unwrap_or(false));
+}
+
+/*
+#[test]
+fn extracting_directories() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("directory.tar"));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+ check_dirtree(&td);
+}
+
+#[test]
+fn extracting_duplicate_file_fail() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path_present = td.path().join("a");
+ t!(File::create(path_present));
+
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_overwrite(false);
+ if let Err(err) = ar.unpack(td.path()) {
+ if err.kind() == std::io::ErrorKind::AlreadyExists {
+ // as expected with overwrite false
+ return;
+ }
+ panic!("unexpected error: {:?}", err);
+ }
+ panic!(
+ "unpack() should have returned an error of kind {:?}, returned Ok",
+ std::io::ErrorKind::AlreadyExists
+ )
+}
+
+#[test]
+fn extracting_duplicate_file_succeed() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path_present = td.path().join("a");
+ t!(File::create(path_present));
+
+ let rdr = Cursor::new(tar!("reading_files.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_overwrite(true);
+ t!(ar.unpack(td.path()));
+}
+
+#[test]
+#[cfg(unix)]
+fn extracting_duplicate_link_fail() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path_present = td.path().join("lnk");
+ t!(std::os::unix::fs::symlink("file", path_present));
+
+ let rdr = Cursor::new(tar!("link.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_overwrite(false);
+ if let Err(err) = ar.unpack(td.path()) {
+ if err.kind() == std::io::ErrorKind::AlreadyExists {
+ // as expected with overwrite false
+ return;
+ }
+ panic!("unexpected error: {:?}", err);
+ }
+ panic!(
+ "unpack() should have returned an error of kind {:?}, returned Ok",
+ std::io::ErrorKind::AlreadyExists
+ )
+}
+
+#[test]
+#[cfg(unix)]
+fn extracting_duplicate_link_succeed() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path_present = td.path().join("lnk");
+ t!(std::os::unix::fs::symlink("file", path_present));
+
+ let rdr = Cursor::new(tar!("link.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_overwrite(true);
+ t!(ar.unpack(td.path()));
+}
+
+#[test]
+#[cfg(all(unix, feature = "xattr"))]
+fn xattrs() {
+ // If /tmp is a tmpfs, xattr will fail
+ // The xattr crate's unit tests also use /var/tmp for this reason
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir_in("/var/tmp"));
+ let rdr = Cursor::new(tar!("xattrs.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_unpack_xattrs(true);
+ t!(ar.unpack(td.path()));
+
+ let val = xattr::get(td.path().join("a/b"), "user.pax.flags").unwrap();
+ assert_eq!(val.unwrap(), "epm".as_bytes());
+}
+
+#[test]
+#[cfg(all(unix, feature = "xattr"))]
+fn no_xattrs() {
+ // If /tmp is a tmpfs, xattr will fail
+ // The xattr crate's unit tests also use /var/tmp for this reason
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir_in("/var/tmp"));
+ let rdr = Cursor::new(tar!("xattrs.tar"));
+ let mut ar = Archive::new(rdr);
+ ar.set_unpack_xattrs(false);
+ t!(ar.unpack(td.path()));
+
+ assert_eq!(
+ xattr::get(td.path().join("a/b"), "user.pax.flags").unwrap(),
+ None
+ );
+}
+
+#[test]
+fn writing_and_extracting_directories() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+ let tmppath = td.path().join("tmpfile");
+ t!(t!(File::create(&tmppath)).write_all(b"c"));
+ t!(ar.append_dir("a", "."));
+ t!(ar.append_dir("a/b", "."));
+ t!(ar.append_file("a/c", &mut t!(File::open(&tmppath))));
+ t!(ar.finish());
+
+ let rdr = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+ check_dirtree(&td);
+}
+
+#[test]
+fn writing_directories_recursively() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let base_dir = td.path().join("base");
+ t!(fs::create_dir(&base_dir));
+ t!(t!(File::create(base_dir.join("file1"))).write_all(b"file1"));
+ let sub_dir = base_dir.join("sub");
+ t!(fs::create_dir(&sub_dir));
+ t!(t!(File::create(sub_dir.join("file2"))).write_all(b"file2"));
+
+ let mut ar = Builder::new(Vec::new());
+ t!(ar.append_dir_all("foobar", base_dir));
+ let data = t!(ar.into_inner());
+
+ let mut ar = Archive::new(Cursor::new(data));
+ t!(ar.unpack(td.path()));
+ let base_dir = td.path().join("foobar");
+ assert!(fs::metadata(&base_dir).map(|m| m.is_dir()).unwrap_or(false));
+ let file1_path = base_dir.join("file1");
+ assert!(fs::metadata(&file1_path)
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ let sub_dir = base_dir.join("sub");
+ assert!(fs::metadata(&sub_dir).map(|m| m.is_dir()).unwrap_or(false));
+ let file2_path = sub_dir.join("file2");
+ assert!(fs::metadata(&file2_path)
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+}
+
+#[test]
+fn append_dir_all_blank_dest() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let base_dir = td.path().join("base");
+ t!(fs::create_dir(&base_dir));
+ t!(t!(File::create(base_dir.join("file1"))).write_all(b"file1"));
+ let sub_dir = base_dir.join("sub");
+ t!(fs::create_dir(&sub_dir));
+ t!(t!(File::create(sub_dir.join("file2"))).write_all(b"file2"));
+
+ let mut ar = Builder::new(Vec::new());
+ t!(ar.append_dir_all("", base_dir));
+ let data = t!(ar.into_inner());
+
+ let mut ar = Archive::new(Cursor::new(data));
+ t!(ar.unpack(td.path()));
+ let base_dir = td.path();
+ assert!(fs::metadata(&base_dir).map(|m| m.is_dir()).unwrap_or(false));
+ let file1_path = base_dir.join("file1");
+ assert!(fs::metadata(&file1_path)
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ let sub_dir = base_dir.join("sub");
+ assert!(fs::metadata(&sub_dir).map(|m| m.is_dir()).unwrap_or(false));
+ let file2_path = sub_dir.join("file2");
+ assert!(fs::metadata(&file2_path)
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+}
+
+#[test]
+fn append_dir_all_does_not_work_on_non_directory() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path = td.path().join("test");
+ t!(t!(File::create(&path)).write_all(b"test"));
+
+ let mut ar = Builder::new(Vec::new());
+ let result = ar.append_dir_all("test", path);
+ assert!(result.is_err());
+}
+
+#[test]
+fn extracting_duplicate_dirs() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("duplicate_dirs.tar"));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+
+ let some_dir = td.path().join("some_dir");
+ assert!(fs::metadata(&some_dir).map(|m| m.is_dir()).unwrap_or(false));
+}
+
+#[test]
+fn unpack_old_style_bsd_dir() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+
+ let mut header = Header::new_old();
+ header.set_entry_type(EntryType::Regular);
+ t!(header.set_path("testdir/"));
+ header.set_size(0);
+ header.set_cksum();
+ t!(ar.append(&header, &mut io::empty()));
+
+ // Extracting
+ let rdr = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+
+ // Iterating
+ let rdr = Cursor::new(ar.into_inner().into_inner());
+ let mut ar = Archive::new(rdr);
+ assert!(t!(ar.entries()).all(|fr| fr.is_ok()));
+
+ assert!(td.path().join("testdir").is_dir());
+}
+
+#[test]
+fn handling_incorrect_file_size() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+
+ let path = td.path().join("tmpfile");
+ t!(File::create(&path));
+ let mut file = t!(File::open(&path));
+ let mut header = Header::new_old();
+ t!(header.set_path("somepath"));
+ header.set_metadata(&t!(file.metadata()));
+ header.set_size(2048); // past the end of file null blocks
+ header.set_cksum();
+ t!(ar.append(&header, &mut file));
+
+ // Extracting
+ let rdr = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rdr);
+ assert!(ar.unpack(td.path()).is_err());
+
+ // Iterating
+ let rdr = Cursor::new(ar.into_inner().into_inner());
+ let mut ar = Archive::new(rdr);
+ assert!(t!(ar.entries()).any(|fr| fr.is_err()));
+}
+
+#[test]
+fn extracting_malicious_tarball() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut evil_tar = Vec::new();
+
+ {
+ let mut a = Builder::new(&mut evil_tar);
+ let mut append = |path: &str| {
+ let mut header = Header::new_gnu();
+ assert!(header.set_path(path).is_err(), "was ok: {:?}", path);
+ {
+ let h = header.as_gnu_mut().unwrap();
+ for (a, b) in h.name.iter_mut().zip(path.as_bytes()) {
+ *a = *b;
+ }
+ }
+ header.set_size(1);
+ header.set_cksum();
+ t!(a.append(&header, io::repeat(1).take(1)));
+ };
+ append("/tmp/abs_evil.txt");
+ // std parse `//` as UNC path, see rust-lang/rust#100833
+ append(
+ #[cfg(not(windows))]
+ "//tmp/abs_evil2.txt",
+ #[cfg(windows)]
+ "C://tmp/abs_evil2.txt",
+ );
+ append("///tmp/abs_evil3.txt");
+ append("/./tmp/abs_evil4.txt");
+ append(
+ #[cfg(not(windows))]
+ "//./tmp/abs_evil5.txt",
+ #[cfg(windows)]
+ "C://./tmp/abs_evil5.txt",
+ );
+ append("///./tmp/abs_evil6.txt");
+ append("/../tmp/rel_evil.txt");
+ append("../rel_evil2.txt");
+ append("./../rel_evil3.txt");
+ append("some/../../rel_evil4.txt");
+ append("");
+ append("././//./..");
+ append("..");
+ append("/////////..");
+ append("/////////");
+ }
+
+ let mut ar = Archive::new(&evil_tar[..]);
+ t!(ar.unpack(td.path()));
+
+ assert!(fs::metadata("/tmp/abs_evil.txt").is_err());
+ assert!(fs::metadata("/tmp/abs_evil.txt2").is_err());
+ assert!(fs::metadata("/tmp/abs_evil.txt3").is_err());
+ assert!(fs::metadata("/tmp/abs_evil.txt4").is_err());
+ assert!(fs::metadata("/tmp/abs_evil.txt5").is_err());
+ assert!(fs::metadata("/tmp/abs_evil.txt6").is_err());
+ assert!(fs::metadata("/tmp/rel_evil.txt").is_err());
+ assert!(fs::metadata("/tmp/rel_evil.txt").is_err());
+ assert!(fs::metadata(td.path().join("../tmp/rel_evil.txt")).is_err());
+ assert!(fs::metadata(td.path().join("../rel_evil2.txt")).is_err());
+ assert!(fs::metadata(td.path().join("../rel_evil3.txt")).is_err());
+ assert!(fs::metadata(td.path().join("../rel_evil4.txt")).is_err());
+
+ // The `some` subdirectory should not be created because the only
+ // filename that references this has '..'.
+ assert!(fs::metadata(td.path().join("some")).is_err());
+
+ // The `tmp` subdirectory should be created and within this
+ // subdirectory, there should be files named `abs_evil.txt` through
+ // `abs_evil6.txt`.
+ assert!(fs::metadata(td.path().join("tmp"))
+ .map(|m| m.is_dir())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil2.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil3.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil4.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil5.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+ assert!(fs::metadata(td.path().join("tmp/abs_evil6.txt"))
+ .map(|m| m.is_file())
+ .unwrap_or(false));
+}
+
+#[test]
+fn octal_spaces() {
+ let rdr = Cursor::new(tar!("spaces.tar"));
+ let mut ar = Archive::new(rdr);
+
+ let entry = ar.entries().unwrap().next().unwrap().unwrap();
+ assert_eq!(entry.header().mode().unwrap() & 0o777, 0o777);
+ assert_eq!(entry.header().uid().unwrap(), 0);
+ assert_eq!(entry.header().gid().unwrap(), 0);
+ assert_eq!(entry.header().size().unwrap(), 2);
+ assert_eq!(entry.header().mtime().unwrap(), 0o12440016664);
+ assert_eq!(entry.header().cksum().unwrap(), 0o4253);
+}
+
+#[test]
+fn extracting_malformed_tar_null_blocks() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+
+ let path1 = td.path().join("tmpfile1");
+ let path2 = td.path().join("tmpfile2");
+ t!(File::create(&path1));
+ t!(File::create(&path2));
+ t!(ar.append_file("tmpfile1", &mut t!(File::open(&path1))));
+ let mut data = t!(ar.into_inner());
+ let amt = data.len();
+ data.truncate(amt - 512);
+ let mut ar = Builder::new(data);
+ t!(ar.append_file("tmpfile2", &mut t!(File::open(&path2))));
+ t!(ar.finish());
+
+ let data = t!(ar.into_inner());
+ let mut ar = Archive::new(&data[..]);
+ assert!(ar.unpack(td.path()).is_ok());
+}
+
+#[test]
+fn empty_filename() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("empty_filename.tar"));
+ let mut ar = Archive::new(rdr);
+ assert!(ar.unpack(td.path()).is_ok());
+}
+
+#[test]
+fn file_times() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("file_times.tar"));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+
+ let meta = fs::metadata(td.path().join("a")).unwrap();
+ let mtime = FileTime::from_last_modification_time(&meta);
+ let atime = FileTime::from_last_access_time(&meta);
+ assert_eq!(mtime.unix_seconds(), 1000000000);
+ assert_eq!(mtime.nanoseconds(), 0);
+ assert_eq!(atime.unix_seconds(), 1000000000);
+ assert_eq!(atime.nanoseconds(), 0);
+}
+
+#[test]
+fn zero_file_times() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+ ar.mode(HeaderMode::Deterministic);
+ let path = td.path().join("tmpfile");
+ t!(File::create(&path));
+ t!(ar.append_path_with_name(&path, "a"));
+
+ let data = t!(ar.into_inner());
+ let mut ar = Archive::new(&data[..]);
+ assert!(ar.unpack(td.path()).is_ok());
+
+ let meta = fs::metadata(td.path().join("a")).unwrap();
+ let mtime = FileTime::from_last_modification_time(&meta);
+ let atime = FileTime::from_last_access_time(&meta);
+ assert!(mtime.unix_seconds() != 0);
+ assert!(atime.unix_seconds() != 0);
+}
+
+#[test]
+fn backslash_treated_well() {
+ // Insert a file into an archive with a backslash
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let mut ar = Builder::new(Vec::<u8>::new());
+ t!(ar.append_dir("foo\\bar", td.path()));
+ let mut ar = Archive::new(Cursor::new(t!(ar.into_inner())));
+ let f = t!(t!(ar.entries()).next().unwrap());
+ if cfg!(unix) {
+ assert_eq!(t!(f.header().path()).to_str(), Some("foo\\bar"));
+ } else {
+ assert_eq!(t!(f.header().path()).to_str(), Some("foo/bar"));
+ }
+
+ // Unpack an archive with a backslash in the name
+ let mut ar = Builder::new(Vec::<u8>::new());
+ let mut header = Header::new_gnu();
+ header.set_metadata(&t!(fs::metadata(td.path())));
+ header.set_size(0);
+ for (a, b) in header.as_old_mut().name.iter_mut().zip(b"foo\\bar\x00") {
+ *a = *b;
+ }
+ header.set_cksum();
+ t!(ar.append(&header, &mut io::empty()));
+ let data = t!(ar.into_inner());
+ let mut ar = Archive::new(&data[..]);
+ let f = t!(t!(ar.entries()).next().unwrap());
+ assert_eq!(t!(f.header().path()).to_str(), Some("foo\\bar"));
+
+ let mut ar = Archive::new(&data[..]);
+ t!(ar.unpack(td.path()));
+ assert!(fs::metadata(td.path().join("foo\\bar")).is_ok());
+}
+
+#[test]
+#[cfg(unix)]
+fn set_mask() {
+ use ::std::os::unix::fs::PermissionsExt;
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_mode(0o777);
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("bar"));
+ header.set_mode(0o421);
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+ ar.set_mask(0o211);
+ t!(ar.unpack(td.path()));
+
+ let md = t!(fs::metadata(td.path().join("foo")));
+ assert_eq!(md.permissions().mode(), 0o100566);
+ let md = t!(fs::metadata(td.path().join("bar")));
+ assert_eq!(md.permissions().mode(), 0o100420);
+}
+
+#[cfg(unix)]
+#[test]
+fn nul_bytes_in_path() {
+ use std::ffi::OsStr;
+ use std::os::unix::prelude::*;
+
+ let nul_path = OsStr::from_bytes(b"foo\0");
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let mut ar = Builder::new(Vec::<u8>::new());
+ let err = ar.append_dir(nul_path, td.path()).unwrap_err();
+ assert!(err.to_string().contains("contains a nul byte"));
+}
+
+#[test]
+fn links() {
+ let mut ar = Archive::new(Cursor::new(tar!("link.tar")));
+ let mut entries = t!(ar.entries());
+ let link = t!(entries.next().unwrap());
+ assert_eq!(
+ t!(link.header().link_name()).as_ref().map(|p| &**p),
+ Some(Path::new("file"))
+ );
+ let other = t!(entries.next().unwrap());
+ assert!(t!(other.header().link_name()).is_none());
+}
+
+#[test]
+#[cfg(unix)] // making symlinks on windows is hard
+fn unpack_links() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let mut ar = Archive::new(Cursor::new(tar!("link.tar")));
+ t!(ar.unpack(td.path()));
+
+ let md = t!(fs::symlink_metadata(td.path().join("lnk")));
+ assert!(md.file_type().is_symlink());
+
+ let mtime = FileTime::from_last_modification_time(&md);
+ assert_eq!(mtime.unix_seconds(), 1448291033);
+
+ assert_eq!(
+ &*t!(fs::read_link(td.path().join("lnk"))),
+ Path::new("file")
+ );
+ t!(File::open(td.path().join("lnk")));
+}
+
+#[test]
+fn pax_size() {
+ let mut ar = Archive::new(tar!("pax_size.tar"));
+ let mut entries = t!(ar.entries());
+ let mut entry = t!(entries.next().unwrap());
+ let mut attributes = t!(entry.pax_extensions()).unwrap();
+
+ let _first = t!(attributes.next().unwrap());
+ let _second = t!(attributes.next().unwrap());
+ let _third = t!(attributes.next().unwrap());
+ let fourth = t!(attributes.next().unwrap());
+ assert!(attributes.next().is_none());
+
+ assert_eq!(fourth.key(), Ok("size"));
+ assert_eq!(fourth.value(), Ok("4"));
+
+ assert_eq!(entry.header().size().unwrap(), 0);
+ assert_eq!(entry.size(), 4);
+}
+
+#[test]
+fn pax_simple() {
+ let mut ar = Archive::new(tar!("pax.tar"));
+ let mut entries = t!(ar.entries());
+
+ let mut first = t!(entries.next().unwrap());
+ let mut attributes = t!(first.pax_extensions()).unwrap();
+ let first = t!(attributes.next().unwrap());
+ let second = t!(attributes.next().unwrap());
+ let third = t!(attributes.next().unwrap());
+ assert!(attributes.next().is_none());
+
+ assert_eq!(first.key(), Ok("mtime"));
+ assert_eq!(first.value(), Ok("1453146164.953123768"));
+ assert_eq!(second.key(), Ok("atime"));
+ assert_eq!(second.value(), Ok("1453251915.24892486"));
+ assert_eq!(third.key(), Ok("ctime"));
+ assert_eq!(third.value(), Ok("1453146164.953123768"));
+}
+
+#[test]
+fn pax_path() {
+ let mut ar = Archive::new(tar!("pax2.tar"));
+ let mut entries = t!(ar.entries());
+
+ let first = t!(entries.next().unwrap());
+ assert!(first.path().unwrap().ends_with("aaaaaaaaaaaaaaa"));
+}
+
+#[test]
+fn pax_linkpath() {
+ let mut ar = Archive::new(tar!("pax2.tar"));
+ let mut links = t!(ar.entries()).skip(3).take(2);
+
+ let long_symlink = t!(links.next().unwrap());
+ let link_name = long_symlink.link_name().unwrap().unwrap();
+ assert!(link_name.to_str().unwrap().len() > 99);
+ assert!(link_name.ends_with("bbbbbbbbbbbbbbb"));
+
+ let long_hardlink = t!(links.next().unwrap());
+ let link_name = long_hardlink.link_name().unwrap().unwrap();
+ assert!(link_name.to_str().unwrap().len() > 99);
+ assert!(link_name.ends_with("ccccccccccccccc"));
+}
+
+#[test]
+fn long_name_trailing_nul() {
+ let mut b = Builder::new(Vec::<u8>::new());
+
+ let mut h = Header::new_gnu();
+ t!(h.set_path("././@LongLink"));
+ h.set_size(4);
+ h.set_entry_type(EntryType::new(b'L'));
+ h.set_cksum();
+ t!(b.append(&h, "foo\0".as_bytes()));
+ let mut h = Header::new_gnu();
+
+ t!(h.set_path("bar"));
+ h.set_size(6);
+ h.set_entry_type(EntryType::file());
+ h.set_cksum();
+ t!(b.append(&h, "foobar".as_bytes()));
+
+ let contents = t!(b.into_inner());
+ let mut a = Archive::new(&contents[..]);
+
+ let e = t!(t!(a.entries()).next().unwrap());
+ assert_eq!(&*e.path_bytes(), b"foo");
+}
+
+#[test]
+fn long_linkname_trailing_nul() {
+ let mut b = Builder::new(Vec::<u8>::new());
+
+ let mut h = Header::new_gnu();
+ t!(h.set_path("././@LongLink"));
+ h.set_size(4);
+ h.set_entry_type(EntryType::new(b'K'));
+ h.set_cksum();
+ t!(b.append(&h, "foo\0".as_bytes()));
+ let mut h = Header::new_gnu();
+
+ t!(h.set_path("bar"));
+ h.set_size(6);
+ h.set_entry_type(EntryType::file());
+ h.set_cksum();
+ t!(b.append(&h, "foobar".as_bytes()));
+
+ let contents = t!(b.into_inner());
+ let mut a = Archive::new(&contents[..]);
+
+ let e = t!(t!(a.entries()).next().unwrap());
+ assert_eq!(&*e.link_name_bytes().unwrap(), b"foo");
+}
+
+#[test]
+fn long_linkname_gnu() {
+ for t in [tar::EntryType::Symlink, tar::EntryType::Link] {
+ let mut b = Builder::new(Vec::<u8>::new());
+ let mut h = Header::new_gnu();
+ h.set_entry_type(t);
+ h.set_size(0);
+ let path = "usr/lib/.build-id/05/159ed904e45ff5100f7acd3d3b99fa7e27e34f";
+ let target = "../../../../usr/lib64/qt5/plugins/wayland-graphics-integration-server/libqt-wayland-compositor-xcomposite-egl.so";
+ t!(b.append_link(&mut h, path, target));
+
+ let contents = t!(b.into_inner());
+ let mut a = Archive::new(&contents[..]);
+
+ let e = &t!(t!(a.entries()).next().unwrap());
+ assert_eq!(e.header().entry_type(), t);
+ assert_eq!(e.path().unwrap().to_str().unwrap(), path);
+ assert_eq!(e.link_name().unwrap().unwrap().to_str().unwrap(), target);
+ }
+}
+
+#[test]
+fn linkname_literal() {
+ for t in [tar::EntryType::Symlink, tar::EntryType::Link] {
+ let mut b = Builder::new(Vec::<u8>::new());
+ let mut h = Header::new_gnu();
+ h.set_entry_type(t);
+ h.set_size(0);
+ let path = "usr/lib/systemd/systemd-sysv-install";
+ let target = "../../..//sbin/chkconfig";
+ h.set_link_name_literal(target).unwrap();
+ t!(b.append_data(&mut h, path, std::io::empty()));
+
+ let contents = t!(b.into_inner());
+ let mut a = Archive::new(&contents[..]);
+
+ let e = &t!(t!(a.entries()).next().unwrap());
+ assert_eq!(e.header().entry_type(), t);
+ assert_eq!(e.path().unwrap().to_str().unwrap(), path);
+ assert_eq!(e.link_name().unwrap().unwrap().to_str().unwrap(), target);
+ }
+}
+
+#[test]
+fn encoded_long_name_has_trailing_nul() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path = td.path().join("foo");
+ t!(t!(File::create(&path)).write_all(b"test"));
+
+ let mut b = Builder::new(Vec::<u8>::new());
+ let long = repeat("abcd").take(200).collect::<String>();
+
+ t!(b.append_file(&long, &mut t!(File::open(&path))));
+
+ let contents = t!(b.into_inner());
+ let mut a = Archive::new(&contents[..]);
+
+ let mut e = t!(t!(a.entries()).raw(true).next().unwrap());
+ let mut name = Vec::new();
+ t!(e.read_to_end(&mut name));
+ assert_eq!(name[name.len() - 1], 0);
+
+ let header_name = &e.header().as_gnu().unwrap().name;
+ assert!(header_name.starts_with(b"././@LongLink\x00"));
+}
+
+#[test]
+fn reading_sparse() {
+ let rdr = Cursor::new(tar!("sparse.tar"));
+ let mut ar = Archive::new(rdr);
+ let mut entries = t!(ar.entries());
+
+ let mut a = t!(entries.next().unwrap());
+ let mut s = String::new();
+ assert_eq!(&*a.header().path_bytes(), b"sparse_begin.txt");
+ t!(a.read_to_string(&mut s));
+ assert_eq!(&s[..5], "test\n");
+ assert!(s[5..].chars().all(|x| x == '\u{0}'));
+
+ let mut a = t!(entries.next().unwrap());
+ let mut s = String::new();
+ assert_eq!(&*a.header().path_bytes(), b"sparse_end.txt");
+ t!(a.read_to_string(&mut s));
+ assert!(s[..s.len() - 9].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[s.len() - 9..], "test_end\n");
+
+ let mut a = t!(entries.next().unwrap());
+ let mut s = String::new();
+ assert_eq!(&*a.header().path_bytes(), b"sparse_ext.txt");
+ t!(a.read_to_string(&mut s));
+ assert!(s[..0x1000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x1000..0x1000 + 5], "text\n");
+ assert!(s[0x1000 + 5..0x3000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x3000..0x3000 + 5], "text\n");
+ assert!(s[0x3000 + 5..0x5000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x5000..0x5000 + 5], "text\n");
+ assert!(s[0x5000 + 5..0x7000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x7000..0x7000 + 5], "text\n");
+ assert!(s[0x7000 + 5..0x9000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x9000..0x9000 + 5], "text\n");
+ assert!(s[0x9000 + 5..0xb000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0xb000..0xb000 + 5], "text\n");
+
+ let mut a = t!(entries.next().unwrap());
+ let mut s = String::new();
+ assert_eq!(&*a.header().path_bytes(), b"sparse.txt");
+ t!(a.read_to_string(&mut s));
+ assert!(s[..0x1000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x1000..0x1000 + 6], "hello\n");
+ assert!(s[0x1000 + 6..0x2fa0].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x2fa0..0x2fa0 + 6], "world\n");
+ assert!(s[0x2fa0 + 6..0x4000].chars().all(|x| x == '\u{0}'));
+
+ assert!(entries.next().is_none());
+}*/
+
+/*
+#[test]
+fn extract_sparse() {
+ let rdr = Cursor::new(tar!("sparse.tar"));
+ let mut ar = Archive::new(rdr);
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ t!(ar.unpack(td.path()));
+
+ let mut s = String::new();
+ t!(t!(File::open(td.path().join("sparse_begin.txt"))).read_to_string(&mut s));
+ assert_eq!(&s[..5], "test\n");
+ assert!(s[5..].chars().all(|x| x == '\u{0}'));
+
+ s.truncate(0);
+ t!(t!(File::open(td.path().join("sparse_end.txt"))).read_to_string(&mut s));
+ assert!(s[..s.len() - 9].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[s.len() - 9..], "test_end\n");
+
+ s.truncate(0);
+ t!(t!(File::open(td.path().join("sparse_ext.txt"))).read_to_string(&mut s));
+ assert!(s[..0x1000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x1000..0x1000 + 5], "text\n");
+ assert!(s[0x1000 + 5..0x3000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x3000..0x3000 + 5], "text\n");
+ assert!(s[0x3000 + 5..0x5000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x5000..0x5000 + 5], "text\n");
+ assert!(s[0x5000 + 5..0x7000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x7000..0x7000 + 5], "text\n");
+ assert!(s[0x7000 + 5..0x9000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x9000..0x9000 + 5], "text\n");
+ assert!(s[0x9000 + 5..0xb000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0xb000..0xb000 + 5], "text\n");
+
+ s.truncate(0);
+ t!(t!(File::open(td.path().join("sparse.txt"))).read_to_string(&mut s));
+ assert!(s[..0x1000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x1000..0x1000 + 6], "hello\n");
+ assert!(s[0x1000 + 6..0x2fa0].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x2fa0..0x2fa0 + 6], "world\n");
+ assert!(s[0x2fa0 + 6..0x4000].chars().all(|x| x == '\u{0}'));
+}*/
+
+/*#[test]
+fn sparse_with_trailing() {
+ let rdr = Cursor::new(tar!("sparse-1.tar"));
+ let mut ar = Archive::new(rdr);
+ let mut entries = t!(ar.entries());
+ let mut a = t!(entries.next().unwrap());
+ let mut s = String::new();
+ t!(a.read_to_string(&mut s));
+ assert_eq!(0x100_00c, s.len());
+ assert_eq!(&s[..0xc], "0MB through\n");
+ assert!(s[0xc..0x100_000].chars().all(|x| x == '\u{0}'));
+ assert_eq!(&s[0x100_000..], "1MB through\n");
+}*/
+
+#[test]
+fn path_separators() {
+ let mut ar = Builder::new(Vec::new());
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let path = td.path().join("test");
+ t!(t!(File::create(&path)).write_all(b"test"));
+
+ let short_path: PathBuf = repeat("abcd").take(2).collect();
+ let long_path: PathBuf = repeat("abcd").take(50).collect();
+
+ // Make sure UStar headers normalize to Unix path separators
+ let mut header = Header::new_ustar();
+
+ t!(header.set_path(&short_path));
+ assert_eq!(t!(header.path()), short_path);
+ assert!(!header.path_bytes().contains(&b'\\'));
+
+ t!(header.set_path(&long_path));
+ assert_eq!(t!(header.path()), long_path);
+ assert!(!header.path_bytes().contains(&b'\\'));
+
+ // Make sure GNU headers normalize to Unix path separators,
+ // including the `@LongLink` fallback used by `append_file`.
+ t!(ar.append_file(&short_path, &mut t!(File::open(&path))));
+ t!(ar.append_file(&long_path, &mut t!(File::open(&path))));
+
+ let rd = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rd);
+ let mut entries = t!(ar.entries());
+
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), short_path);
+ assert!(!entry.path_bytes().contains(&b'\\'));
+
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), long_path);
+ assert!(!entry.path_bytes().contains(&b'\\'));
+
+ assert!(entries.next().is_none());
+}
+
+#[test]
+#[cfg(unix)]
+fn append_path_symlink() {
+ use std::borrow::Cow;
+ use std::env;
+ use std::os::unix::fs::symlink;
+
+ let mut ar = Builder::new(Vec::new());
+ ar.follow_symlinks(false);
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let long_linkname = repeat("abcd").take(30).collect::<String>();
+ let long_pathname = repeat("dcba").take(30).collect::<String>();
+ t!(env::set_current_dir(td.path()));
+ // "short" path name / short link name
+ t!(symlink("testdest", "test"));
+ t!(ar.append_path("test"));
+ // short path name / long link name
+ t!(symlink(&long_linkname, "test2"));
+ t!(ar.append_path("test2"));
+ // long path name / long link name
+ t!(symlink(&long_linkname, &long_pathname));
+ t!(ar.append_path(&long_pathname));
+
+ let rd = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rd);
+ let mut entries = t!(ar.entries());
+
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), Path::new("test"));
+ assert_eq!(
+ t!(entry.link_name()),
+ Some(Cow::from(Path::new("testdest")))
+ );
+ assert_eq!(t!(entry.header().size()), 0);
+
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), Path::new("test2"));
+ assert_eq!(
+ t!(entry.link_name()),
+ Some(Cow::from(Path::new(&long_linkname)))
+ );
+ assert_eq!(t!(entry.header().size()), 0);
+
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), Path::new(&long_pathname));
+ assert_eq!(
+ t!(entry.link_name()),
+ Some(Cow::from(Path::new(&long_linkname)))
+ );
+ assert_eq!(t!(entry.header().size()), 0);
+
+ assert!(entries.next().is_none());
+}
+
+#[test]
+fn name_with_slash_doesnt_fool_long_link_and_bsd_compat() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut ar = Builder::new(Vec::new());
+
+ let mut h = Header::new_gnu();
+ t!(h.set_path("././@LongLink"));
+ h.set_size(4);
+ h.set_entry_type(EntryType::new(b'L'));
+ h.set_cksum();
+ t!(ar.append(&h, "foo\0".as_bytes()));
+
+ let mut header = Header::new_gnu();
+ header.set_entry_type(EntryType::Regular);
+ t!(header.set_path("testdir/"));
+ header.set_size(0);
+ header.set_cksum();
+ t!(ar.append(&header, &mut io::empty()));
+
+ // Extracting
+ let rdr = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rdr);
+ t!(ar.unpack(td.path()));
+
+ // Iterating
+ let rdr = Cursor::new(ar.into_inner().into_inner());
+ let mut ar = Archive::new(rdr);
+ assert!(t!(ar.entries()).all(|fr| fr.is_ok()));
+
+ assert!(td.path().join("foo").is_file());
+}
+
+#[test]
+fn insert_local_file_different_name() {
+ let mut ar = Builder::new(Vec::new());
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let path = td.path().join("directory");
+ t!(fs::create_dir(&path));
+ ar.append_path_with_name(&path, "archive/dir").unwrap();
+ let path = td.path().join("file");
+ t!(t!(File::create(&path)).write_all(b"test"));
+ ar.append_path_with_name(&path, "archive/dir/f").unwrap();
+
+ let rd = Cursor::new(t!(ar.into_inner()));
+ let mut ar = Archive::new(rd);
+ let mut entries = t!(ar.entries());
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), Path::new("archive/dir"));
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(t!(entry.path()), Path::new("archive/dir/f"));
+ assert!(entries.next().is_none());
+}
+
+#[test]
+#[cfg(unix)]
+fn tar_directory_containing_symlink_to_directory() {
+ use std::os::unix::fs::symlink;
+
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let dummy_src = t!(TempBuilder::new().prefix("dummy_src").tempdir());
+ let dummy_dst = td.path().join("dummy_dst");
+ let mut ar = Builder::new(Vec::new());
+ t!(symlink(dummy_src.path().display().to_string(), &dummy_dst));
+
+ assert!(dummy_dst.read_link().is_ok());
+ assert!(dummy_dst.read_link().unwrap().is_dir());
+ ar.append_dir_all("symlinks", td.path()).unwrap();
+ ar.finish().unwrap();
+}
+
+/*#[test]
+fn long_path() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(tar!("7z_long_path.tar"));
+ let mut ar = Archive::new(rdr);
+ assert!(ar.unpack(td.path()).is_ok());
+}*/
+
+/*#[test]
+fn unpack_path_larger_than_windows_max_path() {
+ let dir_name = "iamaprettylongnameandtobepreciseiam91characterslongwhichsomethinkisreallylongandothersdonot";
+ // 183 character directory name
+ let really_long_path = format!("{}{}", dir_name, dir_name);
+ let td = t!(TempBuilder::new().prefix(&really_long_path).tempdir());
+ // directory in 7z_long_path.tar is over 100 chars
+ let rdr = Cursor::new(tar!("7z_long_path.tar"));
+ let mut ar = Archive::new(rdr);
+ // should unpack path greater than windows MAX_PATH length of 260 characters
+ assert!(ar.unpack(td.path()).is_ok());
+}*/
+
+#[test]
+fn append_long_multibyte() {
+ let mut x = tar::Builder::new(Vec::new());
+ let mut name = String::new();
+ let data: &[u8] = &[];
+ for _ in 0..512 {
+ name.push('a');
+ name.push('ð‘¢®');
+ x.append_data(&mut Header::new_gnu(), &name, data).unwrap();
+ name.pop();
+ }
+}
+
+#[test]
+fn read_only_directory_containing_files() {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+
+ let mut b = Builder::new(Vec::<u8>::new());
+
+ let mut h = Header::new_gnu();
+ t!(h.set_path("dir/"));
+ h.set_size(0);
+ h.set_entry_type(EntryType::dir());
+ h.set_mode(0o444);
+ h.set_cksum();
+ t!(b.append(&h, "".as_bytes()));
+
+ let mut h = Header::new_gnu();
+ t!(h.set_path("dir/file"));
+ h.set_size(2);
+ h.set_entry_type(EntryType::file());
+ h.set_cksum();
+ t!(b.append(&h, "hi".as_bytes()));
+
+ let contents = t!(b.into_inner());
+ let mut ar = Archive::new(&contents[..]);
+ assert!(ar.unpack(td.path()).is_ok());
+}
+
+// This test was marked linux only due to macOS CI can't handle `set_current_dir` correctly
+#[test]
+#[cfg(target_os = "linux")]
+fn tar_directory_containing_special_files() {
+ use std::env;
+ use std::ffi::CString;
+
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let fifo = td.path().join("fifo");
+
+ unsafe {
+ let fifo_path = t!(CString::new(fifo.to_str().unwrap()));
+ let ret = libc::mknod(fifo_path.as_ptr(), libc::S_IFIFO | 0o644, 0);
+ if ret != 0 {
+ libc::perror(fifo_path.as_ptr());
+ panic!("Failed to create a FIFO file");
+ }
+ }
+
+ t!(env::set_current_dir(td.path()));
+ let mut ar = Builder::new(Vec::new());
+ // append_path has a different logic for processing files, so we need to test it as well
+ t!(ar.append_path("fifo"));
+ t!(ar.append_dir_all("special", td.path()));
+ // unfortunately, block device file cannot be created by non-root users
+ // as a substitute, just test the file that exists on most Unix systems
+ t!(env::set_current_dir("/dev/"));
+ // debian CI apprently doesn't have loop0, skip testing it if it doesn't exist.
+ if std::path::Path::new("loop0").exists() {
+ t!(ar.append_path("loop0"));
+ }
+ // CI systems seem to have issues with creating a chr device
+ t!(ar.append_path("null"));
+ t!(ar.finish());
+}
+
+#[test]
+fn header_size_overflow() {
+ // maximal file size doesn't overflow anything
+ let mut ar = Builder::new(Vec::new());
+ let mut header = Header::new_gnu();
+ header.set_size(u64::MAX);
+ header.set_cksum();
+ ar.append(&mut header, "x".as_bytes()).unwrap();
+ let result = t!(ar.into_inner());
+ let mut ar = Archive::new(&result[..]);
+ let mut e = ar.entries().unwrap();
+ let err = e.next().unwrap().err().unwrap();
+ assert!(
+ err.to_string().contains("size overflow"),
+ "bad error: {}",
+ err
+ );
+
+ // back-to-back entries that would overflow also don't panic
+ let mut ar = Builder::new(Vec::new());
+ let mut header = Header::new_gnu();
+ header.set_size(1_000);
+ header.set_cksum();
+ ar.append(&mut header, &[0u8; 1_000][..]).unwrap();
+ let mut header = Header::new_gnu();
+ header.set_size(u64::MAX - 513);
+ header.set_cksum();
+ ar.append(&mut header, "x".as_bytes()).unwrap();
+ let result = t!(ar.into_inner());
+ let mut ar = Archive::new(&result[..]);
+ let mut e = ar.entries().unwrap();
+ e.next().unwrap().unwrap();
+ let err = e.next().unwrap().err().unwrap();
+ assert!(
+ err.to_string().contains("size overflow"),
+ "bad error: {}",
+ err
+ );
+}
+
+#[test]
+#[cfg(unix)]
+fn ownership_preserving() {
+ use std::os::unix::prelude::*;
+
+ let mut rdr = Vec::new();
+ let mut ar = Builder::new(&mut rdr);
+ let data: &[u8] = &[];
+ let mut header = Header::new_gnu();
+ // file 1 with uid = 580800000, gid = 580800000
+ header.set_gid(580800000);
+ header.set_uid(580800000);
+ t!(header.set_path("iamuid580800000"));
+ header.set_size(0);
+ header.set_cksum();
+ t!(ar.append(&header, data));
+ // file 2 with uid = 580800001, gid = 580800000
+ header.set_uid(580800001);
+ t!(header.set_path("iamuid580800001"));
+ header.set_cksum();
+ t!(ar.append(&header, data));
+ // file 3 with uid = 580800002, gid = 580800002
+ header.set_gid(580800002);
+ header.set_uid(580800002);
+ t!(header.set_path("iamuid580800002"));
+ header.set_cksum();
+ t!(ar.append(&header, data));
+ t!(ar.finish());
+
+ let rdr = Cursor::new(t!(ar.into_inner()));
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let mut ar = Archive::new(rdr);
+ ar.set_preserve_ownerships(true);
+
+ if unsafe { libc::getuid() } == 0 {
+ assert!(ar.unpack(td.path()).is_ok());
+ // validate against premade files
+ // iamuid580800001 has this ownership: 580800001:580800000
+ let meta = std::fs::metadata(td.path().join("iamuid580800000")).unwrap();
+ assert_eq!(meta.uid(), 580800000);
+ assert_eq!(meta.gid(), 580800000);
+ let meta = std::fs::metadata(td.path().join("iamuid580800001")).unwrap();
+ assert_eq!(meta.uid(), 580800001);
+ assert_eq!(meta.gid(), 580800000);
+ let meta = std::fs::metadata(td.path().join("iamuid580800002")).unwrap();
+ assert_eq!(meta.uid(), 580800002);
+ assert_eq!(meta.gid(), 580800002);
+ } else {
+ // it's not possible to unpack tar while preserving ownership
+ // without root permissions
+ assert!(ar.unpack(td.path()).is_err());
+ }
+}
+
+/*#[test]
+#[cfg(unix)]
+fn pax_and_gnu_uid_gid() {
+ let tarlist = [tar!("biguid_gnu.tar"), tar!("biguid_pax.tar")];
+
+ for file in &tarlist {
+ let td = t!(TempBuilder::new().prefix("tar-rs").tempdir());
+ let rdr = Cursor::new(file);
+ let mut ar = Archive::new(rdr);
+ ar.set_preserve_ownerships(true);
+
+ if unsafe { libc::getuid() } == 0 {
+ t!(ar.unpack(td.path()));
+ let meta = fs::metadata(td.path().join("test.txt")).unwrap();
+ let uid = std::os::unix::prelude::MetadataExt::uid(&meta);
+ let gid = std::os::unix::prelude::MetadataExt::gid(&meta);
+ // 4294967294 = u32::MAX - 1
+ assert_eq!(uid, 4294967294);
+ assert_eq!(gid, 4294967294);
+ } else {
+ // it's not possible to unpack tar while preserving ownership
+ // without root permissions
+ assert!(ar.unpack(td.path()).is_err());
+ }
+ }
+}*/
diff --git a/vendor/tar/tests/entry.rs b/vendor/tar/tests/entry.rs
new file mode 100644
index 0000000..62df663
--- /dev/null
+++ b/vendor/tar/tests/entry.rs
@@ -0,0 +1,410 @@
+extern crate tar;
+extern crate tempfile;
+
+use std::fs::{create_dir, File};
+use std::io::Read;
+
+use tempfile::Builder;
+
+macro_rules! t {
+ ($e:expr) => {
+ match $e {
+ Ok(v) => v,
+ Err(e) => panic!("{} returned {}", stringify!($e), e),
+ }
+ };
+}
+
+#[test]
+fn absolute_symlink() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ t!(ar.unpack(td.path()));
+
+ t!(td.path().join("foo").symlink_metadata());
+
+ let mut ar = tar::Archive::new(&bytes[..]);
+ let mut entries = t!(ar.entries());
+ let entry = t!(entries.next().unwrap());
+ assert_eq!(&*entry.link_name_bytes().unwrap(), b"/bar");
+}
+
+#[test]
+fn absolute_hardlink() {
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Link);
+ t!(header.set_path("bar"));
+ // This absolute path under tempdir will be created at unpack time
+ t!(header.set_link_name(td.path().join("foo")));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ t!(ar.unpack(td.path()));
+ t!(td.path().join("foo").metadata());
+ t!(td.path().join("bar").metadata());
+}
+
+#[test]
+fn relative_hardlink() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Link);
+ t!(header.set_path("bar"));
+ t!(header.set_link_name("foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ t!(ar.unpack(td.path()));
+ t!(td.path().join("foo").metadata());
+ t!(td.path().join("bar").metadata());
+}
+
+#[test]
+fn absolute_link_deref_error() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("/"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ assert!(ar.unpack(td.path()).is_err());
+ t!(td.path().join("foo").symlink_metadata());
+ assert!(File::open(td.path().join("foo").join("bar")).is_err());
+}
+
+#[test]
+fn relative_link_deref_error() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("../../../../"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ assert!(ar.unpack(td.path()).is_err());
+ t!(td.path().join("foo").symlink_metadata());
+ assert!(File::open(td.path().join("foo").join("bar")).is_err());
+}
+
+#[test]
+#[cfg(unix)]
+fn directory_maintains_permissions() {
+ use ::std::os::unix::fs::PermissionsExt;
+
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Directory);
+ t!(header.set_path("foo"));
+ header.set_mode(0o777);
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ t!(ar.unpack(td.path()));
+ let f = t!(File::open(td.path().join("foo")));
+ let md = t!(f.metadata());
+ assert!(md.is_dir());
+ assert_eq!(md.permissions().mode(), 0o40777);
+}
+
+#[test]
+#[cfg(unix)]
+fn set_entry_mask() {
+ use ::std::os::unix::fs::PermissionsExt;
+
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_mode(0o777);
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ let foo_path = td.path().join("foo");
+
+ let mut entries = t!(ar.entries());
+ let mut foo = t!(entries.next().unwrap());
+ foo.set_mask(0o027);
+ t!(foo.unpack(&foo_path));
+
+ let f = t!(File::open(foo_path));
+ let md = t!(f.metadata());
+ assert!(md.is_file());
+ assert_eq!(md.permissions().mode(), 0o100750);
+}
+
+#[test]
+#[cfg(not(windows))] // dangling symlinks have weird permissions
+fn modify_link_just_created() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("bar/foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ t!(ar.unpack(td.path()));
+
+ t!(File::open(td.path().join("bar/foo")));
+ t!(File::open(td.path().join("bar/bar")));
+ t!(File::open(td.path().join("foo/foo")));
+ t!(File::open(td.path().join("foo/bar")));
+}
+
+#[test]
+#[cfg(not(windows))] // dangling symlinks have weird permissions
+fn modify_outside_with_relative_symlink() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("symlink"));
+ t!(header.set_link_name(".."));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("symlink/foo/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ let tar_dir = td.path().join("tar");
+ create_dir(&tar_dir).unwrap();
+ assert!(ar.unpack(tar_dir).is_err());
+ assert!(!td.path().join("foo").exists());
+}
+
+#[test]
+fn parent_paths_error() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name(".."));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo/bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ assert!(ar.unpack(td.path()).is_err());
+ t!(td.path().join("foo").symlink_metadata());
+ assert!(File::open(td.path().join("foo").join("bar")).is_err());
+}
+
+#[test]
+#[cfg(unix)]
+fn good_parent_paths_ok() {
+ use std::path::PathBuf;
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path(PathBuf::from("foo").join("bar")));
+ t!(header.set_link_name(PathBuf::from("..").join("bar")));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("bar"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+ t!(ar.unpack(td.path()));
+ t!(td.path().join("foo").join("bar").read_link());
+ let dst = t!(td.path().join("foo").join("bar").canonicalize());
+ t!(File::open(dst));
+}
+
+#[test]
+fn modify_hard_link_just_created() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Link);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("../test"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(1);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &b"x"[..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+
+ let test = td.path().join("test");
+ t!(File::create(&test));
+
+ let dir = td.path().join("dir");
+ assert!(ar.unpack(&dir).is_err());
+
+ let mut contents = Vec::new();
+ t!(t!(File::open(&test)).read_to_end(&mut contents));
+ assert_eq!(contents.len(), 0);
+}
+
+#[test]
+fn modify_symlink_just_created() {
+ let mut ar = tar::Builder::new(Vec::new());
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(0);
+ header.set_entry_type(tar::EntryType::Symlink);
+ t!(header.set_path("foo"));
+ t!(header.set_link_name("../test"));
+ header.set_cksum();
+ t!(ar.append(&header, &[][..]));
+
+ let mut header = tar::Header::new_gnu();
+ header.set_size(1);
+ header.set_entry_type(tar::EntryType::Regular);
+ t!(header.set_path("foo"));
+ header.set_cksum();
+ t!(ar.append(&header, &b"x"[..]));
+
+ let bytes = t!(ar.into_inner());
+ let mut ar = tar::Archive::new(&bytes[..]);
+
+ let td = t!(Builder::new().prefix("tar").tempdir());
+
+ let test = td.path().join("test");
+ t!(File::create(&test));
+
+ let dir = td.path().join("dir");
+ t!(ar.unpack(&dir));
+
+ let mut contents = Vec::new();
+ t!(t!(File::open(&test)).read_to_end(&mut contents));
+ assert_eq!(contents.len(), 0);
+}
diff --git a/vendor/tar/tests/header/mod.rs b/vendor/tar/tests/header/mod.rs
new file mode 100644
index 0000000..86692e3
--- /dev/null
+++ b/vendor/tar/tests/header/mod.rs
@@ -0,0 +1,246 @@
+use std::fs::{self, File};
+use std::io::{self, Write};
+use std::path::Path;
+use std::{iter, mem, thread, time};
+
+use tempfile::Builder;
+
+use tar::{GnuHeader, Header, HeaderMode};
+
+#[test]
+fn default_gnu() {
+ let mut h = Header::new_gnu();
+ assert!(h.as_gnu().is_some());
+ assert!(h.as_gnu_mut().is_some());
+ assert!(h.as_ustar().is_none());
+ assert!(h.as_ustar_mut().is_none());
+}
+
+#[test]
+fn goto_old() {
+ let mut h = Header::new_old();
+ assert!(h.as_gnu().is_none());
+ assert!(h.as_gnu_mut().is_none());
+ assert!(h.as_ustar().is_none());
+ assert!(h.as_ustar_mut().is_none());
+}
+
+#[test]
+fn goto_ustar() {
+ let mut h = Header::new_ustar();
+ assert!(h.as_gnu().is_none());
+ assert!(h.as_gnu_mut().is_none());
+ assert!(h.as_ustar().is_some());
+ assert!(h.as_ustar_mut().is_some());
+}
+
+#[test]
+fn link_name() {
+ let mut h = Header::new_gnu();
+ t!(h.set_link_name("foo"));
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("foo"));
+ t!(h.set_link_name("../foo"));
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("../foo"));
+ t!(h.set_link_name("foo/bar"));
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("foo/bar"));
+ t!(h.set_link_name("foo\\ba"));
+ if cfg!(windows) {
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("foo/ba"));
+ } else {
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("foo\\ba"));
+ }
+
+ let name = "foo\\bar\0";
+ for (slot, val) in h.as_old_mut().linkname.iter_mut().zip(name.as_bytes()) {
+ *slot = *val;
+ }
+ assert_eq!(t!(h.link_name()).unwrap().to_str(), Some("foo\\bar"));
+
+ assert!(h.set_link_name("\0").is_err());
+}
+
+#[test]
+fn mtime() {
+ let h = Header::new_gnu();
+ assert_eq!(t!(h.mtime()), 0);
+
+ let h = Header::new_ustar();
+ assert_eq!(t!(h.mtime()), 0);
+
+ let h = Header::new_old();
+ assert_eq!(t!(h.mtime()), 0);
+}
+
+#[test]
+fn user_and_group_name() {
+ let mut h = Header::new_gnu();
+ t!(h.set_username("foo"));
+ t!(h.set_groupname("bar"));
+ assert_eq!(t!(h.username()), Some("foo"));
+ assert_eq!(t!(h.groupname()), Some("bar"));
+
+ h = Header::new_ustar();
+ t!(h.set_username("foo"));
+ t!(h.set_groupname("bar"));
+ assert_eq!(t!(h.username()), Some("foo"));
+ assert_eq!(t!(h.groupname()), Some("bar"));
+
+ h = Header::new_old();
+ assert_eq!(t!(h.username()), None);
+ assert_eq!(t!(h.groupname()), None);
+ assert!(h.set_username("foo").is_err());
+ assert!(h.set_groupname("foo").is_err());
+}
+
+#[test]
+fn dev_major_minor() {
+ let mut h = Header::new_gnu();
+ t!(h.set_device_major(1));
+ t!(h.set_device_minor(2));
+ assert_eq!(t!(h.device_major()), Some(1));
+ assert_eq!(t!(h.device_minor()), Some(2));
+
+ h = Header::new_ustar();
+ t!(h.set_device_major(1));
+ t!(h.set_device_minor(2));
+ assert_eq!(t!(h.device_major()), Some(1));
+ assert_eq!(t!(h.device_minor()), Some(2));
+
+ h.as_ustar_mut().unwrap().dev_minor[0] = 0x7f;
+ h.as_ustar_mut().unwrap().dev_major[0] = 0x7f;
+ assert!(h.device_major().is_err());
+ assert!(h.device_minor().is_err());
+
+ h.as_ustar_mut().unwrap().dev_minor[0] = b'g';
+ h.as_ustar_mut().unwrap().dev_major[0] = b'h';
+ assert!(h.device_major().is_err());
+ assert!(h.device_minor().is_err());
+
+ h = Header::new_old();
+ assert_eq!(t!(h.device_major()), None);
+ assert_eq!(t!(h.device_minor()), None);
+ assert!(h.set_device_major(1).is_err());
+ assert!(h.set_device_minor(1).is_err());
+}
+
+#[test]
+fn set_path() {
+ let mut h = Header::new_gnu();
+ t!(h.set_path("foo"));
+ assert_eq!(t!(h.path()).to_str(), Some("foo"));
+ t!(h.set_path("foo/"));
+ assert_eq!(t!(h.path()).to_str(), Some("foo/"));
+ t!(h.set_path("foo/bar"));
+ assert_eq!(t!(h.path()).to_str(), Some("foo/bar"));
+ t!(h.set_path("foo\\bar"));
+ if cfg!(windows) {
+ assert_eq!(t!(h.path()).to_str(), Some("foo/bar"));
+ } else {
+ assert_eq!(t!(h.path()).to_str(), Some("foo\\bar"));
+ }
+
+ // set_path documentation explictly states it removes any ".", signfying the
+ // current directory, from the path. This test ensures that documented
+ // beavhior occurs
+ t!(h.set_path("./control"));
+ assert_eq!(t!(h.path()).to_str(), Some("control"));
+
+ let long_name = iter::repeat("foo").take(100).collect::<String>();
+ let medium1 = iter::repeat("foo").take(52).collect::<String>();
+ let medium2 = iter::repeat("fo/").take(52).collect::<String>();
+
+ assert!(h.set_path(&long_name).is_err());
+ assert!(h.set_path(&medium1).is_err());
+ assert!(h.set_path(&medium2).is_err());
+ assert!(h.set_path("\0").is_err());
+
+ assert!(h.set_path("..").is_err());
+ assert!(h.set_path("foo/..").is_err());
+ assert!(h.set_path("foo/../bar").is_err());
+
+ h = Header::new_ustar();
+ t!(h.set_path("foo"));
+ assert_eq!(t!(h.path()).to_str(), Some("foo"));
+
+ assert!(h.set_path(&long_name).is_err());
+ assert!(h.set_path(&medium1).is_err());
+ t!(h.set_path(&medium2));
+ assert_eq!(t!(h.path()).to_str(), Some(&medium2[..]));
+}
+
+#[test]
+fn set_ustar_path_hard() {
+ let mut h = Header::new_ustar();
+ let p = Path::new("a").join(&vec!["a"; 100].join(""));
+ t!(h.set_path(&p));
+ assert_eq!(t!(h.path()), p);
+}
+
+#[test]
+fn set_metadata_deterministic() {
+ let td = t!(Builder::new().prefix("tar-rs").tempdir());
+ let tmppath = td.path().join("tmpfile");
+
+ fn mk_header(path: &Path, readonly: bool) -> Result<Header, io::Error> {
+ let mut file = t!(File::create(path));
+ t!(file.write_all(b"c"));
+ let mut perms = t!(file.metadata()).permissions();
+ perms.set_readonly(readonly);
+ t!(fs::set_permissions(path, perms));
+ let mut h = Header::new_ustar();
+ h.set_metadata_in_mode(&t!(path.metadata()), HeaderMode::Deterministic);
+ Ok(h)
+ }
+
+ // Create "the same" File twice in a row, one second apart, with differing readonly values.
+ let one = t!(mk_header(tmppath.as_path(), false));
+ thread::sleep(time::Duration::from_millis(1050));
+ let two = t!(mk_header(tmppath.as_path(), true));
+
+ // Always expected to match.
+ assert_eq!(t!(one.size()), t!(two.size()));
+ assert_eq!(t!(one.path()), t!(two.path()));
+ assert_eq!(t!(one.mode()), t!(two.mode()));
+
+ // Would not match without `Deterministic`.
+ assert_eq!(t!(one.mtime()), t!(two.mtime()));
+ // TODO: No great way to validate that these would not be filled, but
+ // check them anyway.
+ assert_eq!(t!(one.uid()), t!(two.uid()));
+ assert_eq!(t!(one.gid()), t!(two.gid()));
+}
+
+#[test]
+fn extended_numeric_format() {
+ let mut h: GnuHeader = unsafe { mem::zeroed() };
+ h.as_header_mut().set_size(42);
+ assert_eq!(h.size, [48, 48, 48, 48, 48, 48, 48, 48, 48, 53, 50, 0]);
+ h.as_header_mut().set_size(8589934593);
+ assert_eq!(h.size, [0x80, 0, 0, 0, 0, 0, 0, 0x02, 0, 0, 0, 1]);
+ h.size = [0x80, 0, 0, 0, 0, 0, 0, 0x02, 0, 0, 0, 0];
+ assert_eq!(h.as_header().entry_size().unwrap(), 0x0200000000);
+ h.size = [48, 48, 48, 48, 48, 48, 48, 48, 48, 53, 51, 0];
+ assert_eq!(h.as_header().entry_size().unwrap(), 43);
+
+ h.as_header_mut().set_gid(42);
+ assert_eq!(h.gid, [48, 48, 48, 48, 48, 53, 50, 0]);
+ assert_eq!(h.as_header().gid().unwrap(), 42);
+ h.as_header_mut().set_gid(0x7fffffffffffffff);
+ assert_eq!(h.gid, [0xff; 8]);
+ assert_eq!(h.as_header().gid().unwrap(), 0x7fffffffffffffff);
+ h.uid = [0x80, 0x00, 0x00, 0x00, 0x12, 0x34, 0x56, 0x78];
+ assert_eq!(h.as_header().uid().unwrap(), 0x12345678);
+
+ h.mtime = [
+ 0x80, 0, 0, 0, 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
+ ];
+ assert_eq!(h.as_header().mtime().unwrap(), 0x0123456789abcdef);
+}
+
+#[test]
+fn byte_slice_conversion() {
+ let h = Header::new_gnu();
+ let b: &[u8] = h.as_bytes();
+ let b_conv: &[u8] = Header::from_byte_slice(h.as_bytes()).as_bytes();
+ assert_eq!(b, b_conv);
+}