diff options
author | Timo Teräs <timo.teras@iki.fi> | 2021-07-26 16:25:03 +0300 |
---|---|---|
committer | Timo Teräs <timo.teras@iki.fi> | 2021-07-27 14:09:38 +0300 |
commit | 9c843e4ecdfee916ec835b5d35c10b3818aba9e3 (patch) | |
tree | d2c703035bbdaa1f21ce0e8ed0cf121b7388f656 /src/tar.c | |
parent | 2d4e88aeb1690220ce57420e8d1d9de327ae901d (diff) | |
download | apk-tools-9c843e4ecdfee916ec835b5d35c10b3818aba9e3.tar.gz apk-tools-9c843e4ecdfee916ec835b5d35c10b3818aba9e3.tar.bz2 apk-tools-9c843e4ecdfee916ec835b5d35c10b3818aba9e3.tar.xz apk-tools-9c843e4ecdfee916ec835b5d35c10b3818aba9e3.zip |
Refactor .apk extraction code
This moves and isolates the tar code to tar.c. And the actual
file extraction to disk is moved to extract.c.
A new API is introduced and used for v2 file extraction. This
essentially moves and isolates the apk_sign_ctx_* beast into
extract_v2.c and offers a saner interface to handling packages.
A place holder is added for v3 extraction.
Diffstat (limited to 'src/tar.c')
-rw-r--r-- | src/tar.c | 317 |
1 files changed, 317 insertions, 0 deletions
diff --git a/src/tar.c b/src/tar.c new file mode 100644 index 0000000..c84ab29 --- /dev/null +++ b/src/tar.c @@ -0,0 +1,317 @@ +/* tar.c - Alpine Package Keeper (APK) + * + * Copyright (C) 2005-2008 Natanael Copa <n@tanael.org> + * Copyright (C) 2008-2011 Timo Teräs <timo.teras@iki.fi> + * All rights reserved. + * + * SPDX-License-Identifier: GPL-2.0-only + */ + +#include <sys/stat.h> +#include <sys/sysmacros.h> + +#include "apk_defines.h" +#include "apk_tar.h" + +struct tar_header { + /* ustar header, Posix 1003.1 */ + char name[100]; /* 0-99 */ + char mode[8]; /* 100-107 */ + char uid[8]; /* 108-115 */ + char gid[8]; /* 116-123 */ + char size[12]; /* 124-135 */ + char mtime[12]; /* 136-147 */ + char chksum[8]; /* 148-155 */ + char typeflag; /* 156-156 */ + char linkname[100]; /* 157-256 */ + char magic[8]; /* 257-264 */ + char uname[32]; /* 265-296 */ + char gname[32]; /* 297-328 */ + char devmajor[8]; /* 329-336 */ + char devminor[8]; /* 337-344 */ + char prefix[155]; /* 345-499 */ + char padding[12]; /* 500-511 */ +}; + +#define TAR_BLOB(s) APK_BLOB_PTR_LEN(s, strnlen(s, sizeof(s))) +#define GET_OCTAL(s) get_octal(s, sizeof(s)) +#define PUT_OCTAL(s,v) put_octal(s, sizeof(s), v) + +static unsigned int get_octal(char *s, size_t l) +{ + apk_blob_t b = APK_BLOB_PTR_LEN(s, l); + return apk_blob_pull_uint(&b, 8); +} + +static void put_octal(char *s, size_t l, size_t value) +{ + char *ptr = &s[l - 1]; + + *(ptr--) = '\0'; + while (value != 0 && ptr >= s) { + *(ptr--) = '0' + (value % 8); + value /= 8; + } + while (ptr >= s) + *(ptr--) = '0'; +} + +static int blob_realloc(apk_blob_t *b, size_t newsize) +{ + char *tmp; + if (b->len >= newsize) return 0; + tmp = realloc(b->ptr, newsize); + if (!tmp) return -ENOMEM; + b->ptr = tmp; + b->len = newsize; + return 0; +} + +static void handle_extended_header(struct apk_file_info *fi, apk_blob_t hdr) +{ + apk_blob_t name, value; + + while (1) { + char *start = hdr.ptr; + unsigned int len = apk_blob_pull_uint(&hdr, 10); + apk_blob_pull_char(&hdr, ' '); + if (!apk_blob_split(hdr, APK_BLOB_STR("="), &name, &hdr)) break; + if (len < hdr.ptr - start + 1) break; + len -= hdr.ptr - start + 1; + if (hdr.len < len) break; + value = APK_BLOB_PTR_LEN(hdr.ptr, len); + hdr = APK_BLOB_PTR_LEN(hdr.ptr+len, hdr.len-len); + apk_blob_pull_char(&hdr, '\n'); + if (APK_BLOB_IS_NULL(hdr)) break; + value.ptr[value.len] = 0; + + if (apk_blob_compare(name, APK_BLOB_STR("path")) == 0) { + fi->name = value.ptr; + } else if (apk_blob_compare(name, APK_BLOB_STR("linkpath")) == 0) { + fi->link_target = value.ptr; + } else if (apk_blob_pull_blob_match(&name, APK_BLOB_STR("SCHILY.xattr."))) { + name.ptr[name.len] = 0; + *apk_xattr_array_add(&fi->xattrs) = (struct apk_xattr) { + .name = name.ptr, + .value = value, + }; + } else if (apk_blob_pull_blob_match(&name, APK_BLOB_STR("APK-TOOLS.checksum."))) { + int alg = APK_DIGEST_NONE; + if (apk_blob_compare(name, APK_BLOB_STR("SHA1")) == 0) + alg = APK_DIGEST_SHA1; + else if (apk_blob_compare(name, APK_BLOB_STR("MD5")) == 0) + alg = APK_DIGEST_MD5; + if (alg > fi->digest.alg) { + apk_digest_set(&fi->digest, alg); + apk_blob_pull_hexdump(&value, APK_DIGEST_BLOB(fi->digest)); + if (APK_BLOB_IS_NULL(value)) apk_digest_reset(&fi->digest); + } + } + } +} + +int apk_tar_parse(struct apk_istream *is, apk_archive_entry_parser parser, + void *ctx, struct apk_id_cache *idc) +{ + struct apk_file_info entry; + struct apk_segment_istream segment; + struct tar_header buf; + int end = 0, r; + size_t toskip, paxlen = 0; + apk_blob_t pax = APK_BLOB_NULL, longname = APK_BLOB_NULL; + char filename[sizeof buf.name + sizeof buf.prefix + 2]; + + if (IS_ERR_OR_NULL(is)) return PTR_ERR(is) ?: -EINVAL; + + memset(&entry, 0, sizeof(entry)); + entry.name = buf.name; + while ((r = apk_istream_read_max(is, &buf, 512)) == 512) { + if (buf.name[0] == '\0') { + if (end) break; + end++; + continue; + } + + entry = (struct apk_file_info){ + .size = GET_OCTAL(buf.size), + .uid = apk_id_cache_resolve_uid(idc, TAR_BLOB(buf.uname), GET_OCTAL(buf.uid)), + .gid = apk_id_cache_resolve_gid(idc, TAR_BLOB(buf.gname), GET_OCTAL(buf.gid)), + .mode = GET_OCTAL(buf.mode) & 07777, + .mtime = GET_OCTAL(buf.mtime), + .name = entry.name, + .uname = buf.uname, + .gname = buf.gname, + .device = makedev(GET_OCTAL(buf.devmajor), + GET_OCTAL(buf.devminor)), + .xattrs = entry.xattrs, + }; + if (buf.prefix[0] && buf.typeflag != 'x' && buf.typeflag != 'g') { + snprintf(filename, sizeof filename, "%.*s/%.*s", + (int) sizeof buf.prefix, buf.prefix, + (int) sizeof buf.name, buf.name); + entry.name = filename; + } + buf.mode[0] = 0; /* to nul terminate 100-byte buf.name */ + buf.magic[0] = 0; /* to nul terminate 100-byte buf.linkname */ + apk_xattr_array_resize(&entry.xattrs, 0); + + if (entry.size >= SSIZE_MAX-512) goto err; + + if (paxlen) { + handle_extended_header(&entry, APK_BLOB_PTR_LEN(pax.ptr, paxlen)); + apk_fileinfo_hash_xattr(&entry, APK_DIGEST_SHA1); + } + + toskip = (entry.size + 511) & -512; + switch (buf.typeflag) { + case 'L': /* GNU long name extension */ + if ((r = blob_realloc(&longname, entry.size+1)) != 0 || + (r = apk_istream_read(is, longname.ptr, entry.size)) < 0) + goto err; + longname.ptr[entry.size] = 0; + entry.name = longname.ptr; + toskip -= entry.size; + break; + case 'K': /* GNU long link target extension - ignored */ + break; + case '0': + case '7': /* regular file */ + entry.mode |= S_IFREG; + break; + case '1': /* hard link */ + entry.mode |= S_IFREG; + if (!entry.link_target) entry.link_target = buf.linkname; + break; + case '2': /* symbolic link */ + entry.mode |= S_IFLNK; + if (!entry.link_target) entry.link_target = buf.linkname; + break; + case '3': /* char device */ + entry.mode |= S_IFCHR; + break; + case '4': /* block device */ + entry.mode |= S_IFBLK; + break; + case '5': /* directory */ + entry.mode |= S_IFDIR; + break; + case '6': /* fifo */ + entry.mode |= S_IFIFO; + break; + case 'g': /* global pax header */ + break; + case 'x': /* file specific pax header */ + paxlen = entry.size; + if ((r = blob_realloc(&pax, (paxlen + 511) & -512)) != 0 || + (r = apk_istream_read(is, pax.ptr, paxlen)) < 0) + goto err; + toskip -= entry.size; + break; + default: + break; + } + + if (strnlen(entry.name, PATH_MAX) >= PATH_MAX-10 || + (entry.link_target && strnlen(entry.link_target, PATH_MAX) >= PATH_MAX-10)) { + r = -ENAMETOOLONG; + goto err; + } + + if (entry.mode & S_IFMT) { + apk_istream_segment(&segment, is, entry.size, entry.mtime); + r = parser(ctx, &entry, &segment.is); + if (r != 0) goto err; + apk_istream_close(&segment.is); + + entry.name = buf.name; + toskip -= entry.size; + paxlen = 0; + } + + if (toskip && (r = apk_istream_read(is, NULL, toskip)) < 0) + goto err; + } + + /* Read remaining end-of-archive records, to ensure we read all of + * the file. The underlying istream is likely doing checksumming. */ + if (r == 512) { + while ((r = apk_istream_read_max(is, &buf, 512)) == 512) { + if (buf.name[0] != 0) break; + } + } + if (r == 0) goto ok; +err: + /* Check that there was no partial (or non-zero) record */ + if (r >= 0) r = -APKE_EOF; +ok: + free(pax.ptr); + free(longname.ptr); + apk_fileinfo_free(&entry); + return apk_istream_close_error(is, r); +} + +int apk_tar_write_entry(struct apk_ostream *os, const struct apk_file_info *ae, + const char *data) +{ + struct tar_header buf; + + memset(&buf, 0, sizeof(buf)); + if (ae != NULL) { + const unsigned char *src; + int chksum, i; + + if (S_ISREG(ae->mode)) + buf.typeflag = '0'; + else + return -1; + + if (ae->name != NULL) + strlcpy(buf.name, ae->name, sizeof buf.name); + + strlcpy(buf.uname, ae->uname ?: "root", sizeof buf.uname); + strlcpy(buf.gname, ae->gname ?: "root", sizeof buf.gname); + + PUT_OCTAL(buf.size, ae->size); + PUT_OCTAL(buf.uid, ae->uid); + PUT_OCTAL(buf.gid, ae->gid); + PUT_OCTAL(buf.mode, ae->mode & 07777); + PUT_OCTAL(buf.mtime, ae->mtime ?: apk_get_build_time()); + + /* Checksum */ + strcpy(buf.magic, "ustar "); + memset(buf.chksum, ' ', sizeof(buf.chksum)); + src = (const unsigned char *) &buf; + for (i = chksum = 0; i < sizeof(buf); i++) + chksum += src[i]; + put_octal(buf.chksum, sizeof(buf.chksum)-1, chksum); + } + + if (apk_ostream_write(os, &buf, sizeof(buf)) < 0) + return -1; + + if (ae == NULL) { + /* End-of-archive is two empty headers */ + if (apk_ostream_write(os, &buf, sizeof(buf)) < 0) + return -1; + } else if (data != NULL) { + if (apk_ostream_write(os, data, ae->size) < 0) + return -1; + if (apk_tar_write_padding(os, ae) != 0) + return -1; + } + + return 0; +} + +int apk_tar_write_padding(struct apk_ostream *os, const struct apk_file_info *ae) +{ + static char padding[512]; + int pad; + + pad = 512 - (ae->size & 511); + if (pad != 512 && + apk_ostream_write(os, padding, pad) < 0) + return -1; + + return 0; +} |