summaryrefslogtreecommitdiff
path: root/ext/phar/zip.c
diff options
context:
space:
mode:
Diffstat (limited to 'ext/phar/zip.c')
-rw-r--r--ext/phar/zip.c1514
1 files changed, 1514 insertions, 0 deletions
diff --git a/ext/phar/zip.c b/ext/phar/zip.c
new file mode 100644
index 0000000..33732fb
--- /dev/null
+++ b/ext/phar/zip.c
@@ -0,0 +1,1514 @@
+/*
+ +----------------------------------------------------------------------+
+ | ZIP archive support for Phar |
+ +----------------------------------------------------------------------+
+ | Copyright (c) 2007-2013 The PHP Group |
+ +----------------------------------------------------------------------+
+ | This source file is subject to version 3.01 of the PHP license, |
+ | that is bundled with this package in the file LICENSE, and is |
+ | available through the world-wide-web at the following url: |
+ | http://www.php.net/license/3_01.txt. |
+ | If you did not receive a copy of the PHP license and are unable to |
+ | obtain it through the world-wide-web, please send a note to |
+ | license@php.net so we can mail you a copy immediately. |
+ +----------------------------------------------------------------------+
+ | Authors: Gregory Beaver <cellog@php.net> |
+ +----------------------------------------------------------------------+
+*/
+
+#include "phar_internal.h"
+
+#define PHAR_GET_16(var) ((php_uint16)((((php_uint16)var[0]) & 0xff) | \
+ (((php_uint16)var[1]) & 0xff) << 8))
+#define PHAR_GET_32(var) ((php_uint32)((((php_uint32)var[0]) & 0xff) | \
+ (((php_uint32)var[1]) & 0xff) << 8 | \
+ (((php_uint32)var[2]) & 0xff) << 16 | \
+ (((php_uint32)var[3]) & 0xff) << 24))
+static inline void phar_write_32(char buffer[4], php_uint32 value)
+{
+ buffer[3] = (unsigned char) ((value & 0xff000000) >> 24);
+ buffer[2] = (unsigned char) ((value & 0xff0000) >> 16);
+ buffer[1] = (unsigned char) ((value & 0xff00) >> 8);
+ buffer[0] = (unsigned char) (value & 0xff);
+}
+static inline void phar_write_16(char buffer[2], php_uint32 value)
+{
+ buffer[1] = (unsigned char) ((value & 0xff00) >> 8);
+ buffer[0] = (unsigned char) (value & 0xff);
+}
+# define PHAR_SET_32(var, value) phar_write_32(var, (php_uint32) (value));
+# define PHAR_SET_16(var, value) phar_write_16(var, (php_uint16) (value));
+
+static int phar_zip_process_extra(php_stream *fp, phar_entry_info *entry, php_uint16 len TSRMLS_DC) /* {{{ */
+{
+ union {
+ phar_zip_extra_field_header header;
+ phar_zip_unix3 unix3;
+ } h;
+ int read;
+
+ do {
+ if (sizeof(h.header) != php_stream_read(fp, (char *) &h.header, sizeof(h.header))) {
+ return FAILURE;
+ }
+
+ if (h.header.tag[0] != 'n' || h.header.tag[1] != 'u') {
+ /* skip to next header */
+ php_stream_seek(fp, PHAR_GET_16(h.header.size), SEEK_CUR);
+ len -= PHAR_GET_16(h.header.size) + 4;
+ continue;
+ }
+
+ /* unix3 header found */
+ read = php_stream_read(fp, (char *) &(h.unix3.crc32), sizeof(h.unix3) - sizeof(h.header));
+ len -= read + 4;
+
+ if (sizeof(h.unix3) - sizeof(h.header) != read) {
+ return FAILURE;
+ }
+
+ if (PHAR_GET_16(h.unix3.size) > sizeof(h.unix3) - 4) {
+ /* skip symlink filename - we may add this support in later */
+ php_stream_seek(fp, PHAR_GET_16(h.unix3.size) - sizeof(h.unix3.size), SEEK_CUR);
+ }
+
+ /* set permissions */
+ entry->flags &= PHAR_ENT_COMPRESSION_MASK;
+
+ if (entry->is_dir) {
+ entry->flags |= PHAR_GET_16(h.unix3.perms) & PHAR_ENT_PERM_MASK;
+ } else {
+ entry->flags |= PHAR_GET_16(h.unix3.perms) & PHAR_ENT_PERM_MASK;
+ }
+
+ } while (len);
+
+ return SUCCESS;
+}
+/* }}} */
+
+/*
+ extracted from libzip
+ zip_dirent.c -- read directory entry (local or central), clean dirent
+ Copyright (C) 1999, 2003, 2004, 2005 Dieter Baron and Thomas Klausner
+
+ This function is part of libzip, a library to manipulate ZIP archives.
+ The authors can be contacted at <nih@giga.or.at>
+
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions
+ are met:
+ 1. Redistributions of source code must retain the above copyright
+ notice, this list of conditions and the following disclaimer.
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in
+ the documentation and/or other materials provided with the
+ distribution.
+ 3. The names of the authors may not be used to endorse or promote
+ products derived from this software without specific prior
+ written permission.
+
+ THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
+ OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
+ DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
+ GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
+ IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+ OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
+ IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+static time_t phar_zip_d2u_time(char *cdtime, char *cddate) /* {{{ */
+{
+ int dtime = PHAR_GET_16(cdtime), ddate = PHAR_GET_16(cddate);
+ struct tm *tm, tmbuf;
+ time_t now;
+
+ now = time(NULL);
+ tm = php_localtime_r(&now, &tmbuf);
+
+ tm->tm_year = ((ddate>>9)&127) + 1980 - 1900;
+ tm->tm_mon = ((ddate>>5)&15) - 1;
+ tm->tm_mday = ddate&31;
+
+ tm->tm_hour = (dtime>>11)&31;
+ tm->tm_min = (dtime>>5)&63;
+ tm->tm_sec = (dtime<<1)&62;
+
+ return mktime(tm);
+}
+/* }}} */
+
+static void phar_zip_u2d_time(time_t time, char *dtime, char *ddate) /* {{{ */
+{
+ php_uint16 ctime, cdate;
+ struct tm *tm, tmbuf;
+
+ tm = php_localtime_r(&time, &tmbuf);
+ cdate = ((tm->tm_year+1900-1980)<<9) + ((tm->tm_mon+1)<<5) + tm->tm_mday;
+ ctime = ((tm->tm_hour)<<11) + ((tm->tm_min)<<5) + ((tm->tm_sec)>>1);
+ PHAR_SET_16(dtime, ctime);
+ PHAR_SET_16(ddate, cdate);
+}
+/* }}} */
+
+/**
+ * Does not check for a previously opened phar in the cache.
+ *
+ * Parse a new one and add it to the cache, returning either SUCCESS or
+ * FAILURE, and setting pphar to the pointer to the manifest entry
+ *
+ * This is used by phar_open_from_fp to process a zip-based phar, but can be called
+ * directly.
+ */
+int phar_parse_zipfile(php_stream *fp, char *fname, int fname_len, char *alias, int alias_len, phar_archive_data** pphar, char **error TSRMLS_DC) /* {{{ */
+{
+ phar_zip_dir_end locator;
+ char buf[sizeof(locator) + 65536];
+ long size;
+ php_uint16 i;
+ phar_archive_data *mydata = NULL;
+ phar_entry_info entry = {0};
+ char *p = buf, *ext, *actual_alias = NULL;
+ char *metadata = NULL;
+
+ size = php_stream_tell(fp);
+
+ if (size > sizeof(locator) + 65536) {
+ /* seek to max comment length + end of central directory record */
+ size = sizeof(locator) + 65536;
+ if (FAILURE == php_stream_seek(fp, -size, SEEK_END)) {
+ php_stream_close(fp);
+ if (error) {
+ spprintf(error, 4096, "phar error: unable to search for end of central directory in zip-based phar \"%s\"", fname);
+ }
+ return FAILURE;
+ }
+ } else {
+ php_stream_seek(fp, 0, SEEK_SET);
+ }
+
+ if (!php_stream_read(fp, buf, size)) {
+ php_stream_close(fp);
+ if (error) {
+ spprintf(error, 4096, "phar error: unable to read in data to search for end of central directory in zip-based phar \"%s\"", fname);
+ }
+ return FAILURE;
+ }
+
+ while ((p=(char *) memchr(p + 1, 'P', (size_t) (size - (p + 1 - buf)))) != NULL) {
+ if (!memcmp(p + 1, "K\5\6", 3)) {
+ memcpy((void *)&locator, (void *) p, sizeof(locator));
+ if (PHAR_GET_16(locator.centraldisk) != 0 || PHAR_GET_16(locator.disknumber) != 0) {
+ /* split archives not handled */
+ php_stream_close(fp);
+ if (error) {
+ spprintf(error, 4096, "phar error: split archives spanning multiple zips cannot be processed in zip-based phar \"%s\"", fname);
+ }
+ return FAILURE;
+ }
+
+ if (PHAR_GET_16(locator.counthere) != PHAR_GET_16(locator.count)) {
+ if (error) {
+ spprintf(error, 4096, "phar error: corrupt zip archive, conflicting file count in end of central directory record in zip-based phar \"%s\"", fname);
+ }
+ php_stream_close(fp);
+ return FAILURE;
+ }
+
+ mydata = pecalloc(1, sizeof(phar_archive_data), PHAR_G(persist));
+ mydata->is_persistent = PHAR_G(persist);
+
+ /* read in archive comment, if any */
+ if (PHAR_GET_16(locator.comment_len)) {
+
+ metadata = p + sizeof(locator);
+
+ if (PHAR_GET_16(locator.comment_len) != size - (metadata - buf)) {
+ if (error) {
+ spprintf(error, 4096, "phar error: corrupt zip archive, zip file comment truncated in zip-based phar \"%s\"", fname);
+ }
+ php_stream_close(fp);
+ pefree(mydata, mydata->is_persistent);
+ return FAILURE;
+ }
+
+ mydata->metadata_len = PHAR_GET_16(locator.comment_len);
+
+ if (phar_parse_metadata(&metadata, &mydata->metadata, PHAR_GET_16(locator.comment_len) TSRMLS_CC) == FAILURE) {
+ mydata->metadata_len = 0;
+ /* if not valid serialized data, it is a regular string */
+
+ if (entry.is_persistent) {
+ ALLOC_PERMANENT_ZVAL(mydata->metadata);
+ } else {
+ ALLOC_ZVAL(mydata->metadata);
+ }
+
+ INIT_ZVAL(*mydata->metadata);
+ metadata = pestrndup(metadata, PHAR_GET_16(locator.comment_len), mydata->is_persistent);
+ ZVAL_STRINGL(mydata->metadata, metadata, PHAR_GET_16(locator.comment_len), 0);
+ }
+ } else {
+ mydata->metadata = NULL;
+ }
+
+ goto foundit;
+ }
+ }
+
+ php_stream_close(fp);
+
+ if (error) {
+ spprintf(error, 4096, "phar error: end of central directory not found in zip-based phar \"%s\"", fname);
+ }
+
+ return FAILURE;
+foundit:
+ mydata->fname = pestrndup(fname, fname_len, mydata->is_persistent);
+#ifdef PHP_WIN32
+ phar_unixify_path_separators(mydata->fname, fname_len);
+#endif
+ mydata->is_zip = 1;
+ mydata->fname_len = fname_len;
+ ext = strrchr(mydata->fname, '/');
+
+ if (ext) {
+ mydata->ext = memchr(ext, '.', (mydata->fname + fname_len) - ext);
+ if (mydata->ext == ext) {
+ mydata->ext = memchr(ext + 1, '.', (mydata->fname + fname_len) - ext - 1);
+ }
+ if (mydata->ext) {
+ mydata->ext_len = (mydata->fname + fname_len) - mydata->ext;
+ }
+ }
+
+ /* clean up on big-endian systems */
+ /* seek to central directory */
+ php_stream_seek(fp, PHAR_GET_32(locator.cdir_offset), SEEK_SET);
+ /* read in central directory */
+ zend_hash_init(&mydata->manifest, PHAR_GET_16(locator.count),
+ zend_get_hash_value, destroy_phar_manifest_entry, (zend_bool)mydata->is_persistent);
+ zend_hash_init(&mydata->mounted_dirs, 5,
+ zend_get_hash_value, NULL, (zend_bool)mydata->is_persistent);
+ zend_hash_init(&mydata->virtual_dirs, PHAR_GET_16(locator.count) * 2,
+ zend_get_hash_value, NULL, (zend_bool)mydata->is_persistent);
+ entry.phar = mydata;
+ entry.is_zip = 1;
+ entry.fp_type = PHAR_FP;
+ entry.is_persistent = mydata->is_persistent;
+#define PHAR_ZIP_FAIL_FREE(errmsg, save) \
+ zend_hash_destroy(&mydata->manifest); \
+ mydata->manifest.arBuckets = 0; \
+ zend_hash_destroy(&mydata->mounted_dirs); \
+ mydata->mounted_dirs.arBuckets = 0; \
+ zend_hash_destroy(&mydata->virtual_dirs); \
+ mydata->virtual_dirs.arBuckets = 0; \
+ php_stream_close(fp); \
+ if (mydata->metadata) { \
+ zval_dtor(mydata->metadata); \
+ } \
+ if (mydata->signature) { \
+ efree(mydata->signature); \
+ } \
+ if (error) { \
+ spprintf(error, 4096, "phar error: %s in zip-based phar \"%s\"", errmsg, mydata->fname); \
+ } \
+ pefree(mydata->fname, mydata->is_persistent); \
+ if (mydata->alias) { \
+ pefree(mydata->alias, mydata->is_persistent); \
+ } \
+ pefree(mydata, mydata->is_persistent); \
+ efree(save); \
+ return FAILURE;
+#define PHAR_ZIP_FAIL(errmsg) \
+ zend_hash_destroy(&mydata->manifest); \
+ mydata->manifest.arBuckets = 0; \
+ zend_hash_destroy(&mydata->mounted_dirs); \
+ mydata->mounted_dirs.arBuckets = 0; \
+ zend_hash_destroy(&mydata->virtual_dirs); \
+ mydata->virtual_dirs.arBuckets = 0; \
+ php_stream_close(fp); \
+ if (mydata->metadata) { \
+ zval_dtor(mydata->metadata); \
+ } \
+ if (mydata->signature) { \
+ efree(mydata->signature); \
+ } \
+ if (error) { \
+ spprintf(error, 4096, "phar error: %s in zip-based phar \"%s\"", errmsg, mydata->fname); \
+ } \
+ pefree(mydata->fname, mydata->is_persistent); \
+ if (mydata->alias) { \
+ pefree(mydata->alias, mydata->is_persistent); \
+ } \
+ pefree(mydata, mydata->is_persistent); \
+ return FAILURE;
+
+ /* add each central directory item to the manifest */
+ for (i = 0; i < PHAR_GET_16(locator.count); ++i) {
+ phar_zip_central_dir_file zipentry;
+ off_t beforeus = php_stream_tell(fp);
+
+ if (sizeof(zipentry) != php_stream_read(fp, (char *) &zipentry, sizeof(zipentry))) {
+ PHAR_ZIP_FAIL("unable to read central directory entry, truncated");
+ }
+
+ /* clean up for bigendian systems */
+ if (memcmp("PK\1\2", zipentry.signature, 4)) {
+ /* corrupted entry */
+ PHAR_ZIP_FAIL("corrupted central directory entry, no magic signature");
+ }
+
+ if (entry.is_persistent) {
+ entry.manifest_pos = i;
+ }
+
+ entry.compressed_filesize = PHAR_GET_32(zipentry.compsize);
+ entry.uncompressed_filesize = PHAR_GET_32(zipentry.uncompsize);
+ entry.crc32 = PHAR_GET_32(zipentry.crc32);
+ /* do not PHAR_GET_16 either on the next line */
+ entry.timestamp = phar_zip_d2u_time(zipentry.timestamp, zipentry.datestamp);
+ entry.flags = PHAR_ENT_PERM_DEF_FILE;
+ entry.header_offset = PHAR_GET_32(zipentry.offset);
+ entry.offset = entry.offset_abs = PHAR_GET_32(zipentry.offset) + sizeof(phar_zip_file_header) + PHAR_GET_16(zipentry.filename_len) +
+ PHAR_GET_16(zipentry.extra_len);
+
+ if (PHAR_GET_16(zipentry.flags) & PHAR_ZIP_FLAG_ENCRYPTED) {
+ PHAR_ZIP_FAIL("Cannot process encrypted zip files");
+ }
+
+ if (!PHAR_GET_16(zipentry.filename_len)) {
+ PHAR_ZIP_FAIL("Cannot process zips created from stdin (zero-length filename)");
+ }
+
+ entry.filename_len = PHAR_GET_16(zipentry.filename_len);
+ entry.filename = (char *) pemalloc(entry.filename_len + 1, entry.is_persistent);
+
+ if (entry.filename_len != php_stream_read(fp, entry.filename, entry.filename_len)) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unable to read in filename from central directory, truncated");
+ }
+
+ entry.filename[entry.filename_len] = '\0';
+
+ if (entry.filename[entry.filename_len - 1] == '/') {
+ entry.is_dir = 1;
+ entry.filename_len--;
+ entry.flags |= PHAR_ENT_PERM_DEF_DIR;
+ } else {
+ entry.is_dir = 0;
+ }
+
+ if (entry.filename_len == sizeof(".phar/signature.bin")-1 && !strncmp(entry.filename, ".phar/signature.bin", sizeof(".phar/signature.bin")-1)) {
+ size_t read;
+ php_stream *sigfile;
+ off_t now;
+ char *sig;
+
+ now = php_stream_tell(fp);
+ pefree(entry.filename, entry.is_persistent);
+ sigfile = php_stream_fopen_tmpfile();
+ if (!sigfile) {
+ PHAR_ZIP_FAIL("couldn't open temporary file");
+ }
+
+ php_stream_seek(fp, 0, SEEK_SET);
+ /* copy file contents + local headers and zip comment, if any, to be hashed for signature */
+ phar_stream_copy_to_stream(fp, sigfile, entry.header_offset, NULL);
+ /* seek to central directory */
+ php_stream_seek(fp, PHAR_GET_32(locator.cdir_offset), SEEK_SET);
+ /* copy central directory header */
+ phar_stream_copy_to_stream(fp, sigfile, beforeus - PHAR_GET_32(locator.cdir_offset), NULL);
+ if (metadata) {
+ php_stream_write(sigfile, metadata, PHAR_GET_16(locator.comment_len));
+ }
+ php_stream_seek(fp, sizeof(phar_zip_file_header) + entry.header_offset + entry.filename_len + PHAR_GET_16(zipentry.extra_len), SEEK_SET);
+ sig = (char *) emalloc(entry.uncompressed_filesize);
+ read = php_stream_read(fp, sig, entry.uncompressed_filesize);
+ if (read != entry.uncompressed_filesize) {
+ php_stream_close(sigfile);
+ efree(sig);
+ PHAR_ZIP_FAIL("signature cannot be read");
+ }
+ mydata->sig_flags = PHAR_GET_32(sig);
+ if (FAILURE == phar_verify_signature(sigfile, php_stream_tell(sigfile), mydata->sig_flags, sig + 8, entry.uncompressed_filesize - 8, fname, &mydata->signature, &mydata->sig_len, error TSRMLS_CC)) {
+ efree(sig);
+ if (error) {
+ char *save;
+ php_stream_close(sigfile);
+ spprintf(&save, 4096, "signature cannot be verified: %s", *error);
+ efree(*error);
+ PHAR_ZIP_FAIL_FREE(save, save);
+ } else {
+ php_stream_close(sigfile);
+ PHAR_ZIP_FAIL("signature cannot be verified");
+ }
+ }
+ php_stream_close(sigfile);
+ efree(sig);
+ /* signature checked out, let's ensure this is the last file in the phar */
+ if (i != PHAR_GET_16(locator.count) - 1) {
+ PHAR_ZIP_FAIL("entries exist after signature, invalid phar");
+ }
+
+ continue;
+ }
+
+ phar_add_virtual_dirs(mydata, entry.filename, entry.filename_len TSRMLS_CC);
+
+ if (PHAR_GET_16(zipentry.extra_len)) {
+ off_t loc = php_stream_tell(fp);
+ if (FAILURE == phar_zip_process_extra(fp, &entry, PHAR_GET_16(zipentry.extra_len) TSRMLS_CC)) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("Unable to process extra field header for file in central directory");
+ }
+ php_stream_seek(fp, loc + PHAR_GET_16(zipentry.extra_len), SEEK_SET);
+ }
+
+ switch (PHAR_GET_16(zipentry.compressed)) {
+ case PHAR_ZIP_COMP_NONE :
+ /* compression flag already set */
+ break;
+ case PHAR_ZIP_COMP_DEFLATE :
+ entry.flags |= PHAR_ENT_COMPRESSED_GZ;
+ if (!PHAR_G(has_zlib)) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("zlib extension is required");
+ }
+ break;
+ case PHAR_ZIP_COMP_BZIP2 :
+ entry.flags |= PHAR_ENT_COMPRESSED_BZ2;
+ if (!PHAR_G(has_bz2)) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("bzip2 extension is required");
+ }
+ break;
+ case 1 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (Shrunk) used in this zip");
+ case 2 :
+ case 3 :
+ case 4 :
+ case 5 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (Reduce) used in this zip");
+ case 6 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (Implode) used in this zip");
+ case 7 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (Tokenize) used in this zip");
+ case 9 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (Deflate64) used in this zip");
+ case 10 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (PKWare Implode/old IBM TERSE) used in this zip");
+ case 14 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (LZMA) used in this zip");
+ case 18 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (IBM TERSE) used in this zip");
+ case 19 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (IBM LZ77) used in this zip");
+ case 97 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (WavPack) used in this zip");
+ case 98 :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (PPMd) used in this zip");
+ default :
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unsupported compression method (unknown) used in this zip");
+ }
+
+ /* get file metadata */
+ if (PHAR_GET_16(zipentry.comment_len)) {
+ if (PHAR_GET_16(zipentry.comment_len) != php_stream_read(fp, buf, PHAR_GET_16(zipentry.comment_len))) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unable to read in file comment, truncated");
+ }
+
+ p = buf;
+ entry.metadata_len = PHAR_GET_16(zipentry.comment_len);
+
+ if (phar_parse_metadata(&p, &(entry.metadata), PHAR_GET_16(zipentry.comment_len) TSRMLS_CC) == FAILURE) {
+ entry.metadata_len = 0;
+ /* if not valid serialized data, it is a regular string */
+
+ if (entry.is_persistent) {
+ ALLOC_PERMANENT_ZVAL(entry.metadata);
+ } else {
+ ALLOC_ZVAL(entry.metadata);
+ }
+
+ INIT_ZVAL(*entry.metadata);
+ ZVAL_STRINGL(entry.metadata, pestrndup(buf, PHAR_GET_16(zipentry.comment_len), entry.is_persistent), PHAR_GET_16(zipentry.comment_len), 0);
+ }
+ } else {
+ entry.metadata = NULL;
+ }
+
+ if (!actual_alias && entry.filename_len == sizeof(".phar/alias.txt")-1 && !strncmp(entry.filename, ".phar/alias.txt", sizeof(".phar/alias.txt")-1)) {
+ php_stream_filter *filter;
+ off_t saveloc;
+ /* verify local file header */
+ phar_zip_file_header local;
+
+ /* archive alias found */
+ saveloc = php_stream_tell(fp);
+ php_stream_seek(fp, PHAR_GET_32(zipentry.offset), SEEK_SET);
+
+ if (sizeof(local) != php_stream_read(fp, (char *) &local, sizeof(local))) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("phar error: internal corruption of zip-based phar (cannot read local file header for alias)");
+ }
+
+ /* verify local header */
+ if (entry.filename_len != PHAR_GET_16(local.filename_len) || entry.crc32 != PHAR_GET_32(local.crc32) || entry.uncompressed_filesize != PHAR_GET_32(local.uncompsize) || entry.compressed_filesize != PHAR_GET_32(local.compsize)) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("phar error: internal corruption of zip-based phar (local header of alias does not match central directory)");
+ }
+
+ /* construct actual offset to file start - local extra_len can be different from central extra_len */
+ entry.offset = entry.offset_abs =
+ sizeof(local) + entry.header_offset + PHAR_GET_16(local.filename_len) + PHAR_GET_16(local.extra_len);
+#if PHP_VERSION_ID < 50207
+ /* work around Bug #46147 */
+ fp->writepos = fp->readpos = 0;
+#endif
+ php_stream_seek(fp, entry.offset, SEEK_SET);
+ /* these next lines should be for php < 5.2.6 after 5.3 filters are fixed */
+ fp->writepos = 0;
+ fp->readpos = 0;
+ php_stream_seek(fp, entry.offset, SEEK_SET);
+ fp->writepos = 0;
+ fp->readpos = 0;
+ /* the above lines should be for php < 5.2.6 after 5.3 filters are fixed */
+
+ mydata->alias_len = entry.uncompressed_filesize;
+
+ if (entry.flags & PHAR_ENT_COMPRESSED_GZ) {
+ filter = php_stream_filter_create("zlib.inflate", NULL, php_stream_is_persistent(fp) TSRMLS_CC);
+
+ if (!filter) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unable to decompress alias, zlib filter creation failed");
+ }
+
+ php_stream_filter_append(&fp->readfilters, filter);
+
+ if (!(entry.uncompressed_filesize = php_stream_copy_to_mem(fp, &actual_alias, entry.uncompressed_filesize, 0)) || !actual_alias) {
+ pefree(entry.filename, entry.is_persistent);
+#if PHP_VERSION_ID < 50207
+ PHAR_ZIP_FAIL("unable to read in alias, truncated (PHP 5.2.7 and newer has a potential fix for this problem)");
+#endif
+ PHAR_ZIP_FAIL("unable to read in alias, truncated");
+ }
+
+ php_stream_filter_flush(filter, 1);
+ php_stream_filter_remove(filter, 1 TSRMLS_CC);
+
+ } else if (entry.flags & PHAR_ENT_COMPRESSED_BZ2) {
+ filter = php_stream_filter_create("bzip2.decompress", NULL, php_stream_is_persistent(fp) TSRMLS_CC);
+
+ if (!filter) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unable to read in alias, bzip2 filter creation failed");
+ }
+
+ php_stream_filter_append(&fp->readfilters, filter);
+
+ if (!(entry.uncompressed_filesize = php_stream_copy_to_mem(fp, &actual_alias, entry.uncompressed_filesize, 0)) || !actual_alias) {
+ pefree(entry.filename, entry.is_persistent);
+#if PHP_VERSION_ID < 50207
+ PHAR_ZIP_FAIL("unable to read in alias, truncated (PHP 5.2.7 and newer has a potential fix for this problem)");
+#endif
+ PHAR_ZIP_FAIL("unable to read in alias, truncated");
+ }
+
+ php_stream_filter_flush(filter, 1);
+ php_stream_filter_remove(filter, 1 TSRMLS_CC);
+ } else {
+ if (!(entry.uncompressed_filesize = php_stream_copy_to_mem(fp, &actual_alias, entry.uncompressed_filesize, 0)) || !actual_alias) {
+ pefree(entry.filename, entry.is_persistent);
+ PHAR_ZIP_FAIL("unable to read in alias, truncated");
+ }
+ }
+
+ /* return to central directory parsing */
+ php_stream_seek(fp, saveloc, SEEK_SET);
+ }
+
+ phar_set_inode(&entry TSRMLS_CC);
+ zend_hash_add(&mydata->manifest, entry.filename, entry.filename_len, (void *)&entry,sizeof(phar_entry_info), NULL);
+ }
+
+ mydata->fp = fp;
+
+ if (zend_hash_exists(&(mydata->manifest), ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
+ mydata->is_data = 0;
+ } else {
+ mydata->is_data = 1;
+ }
+
+ zend_hash_add(&(PHAR_GLOBALS->phar_fname_map), mydata->fname, fname_len, (void*)&mydata, sizeof(phar_archive_data*), NULL);
+
+ if (actual_alias) {
+ phar_archive_data **fd_ptr;
+
+ if (!phar_validate_alias(actual_alias, mydata->alias_len)) {
+ if (error) {
+ spprintf(error, 4096, "phar error: invalid alias \"%s\" in zip-based phar \"%s\"", actual_alias, fname);
+ }
+ efree(actual_alias);
+ zend_hash_del(&(PHAR_GLOBALS->phar_fname_map), mydata->fname, fname_len);
+ return FAILURE;
+ }
+
+ mydata->is_temporary_alias = 0;
+
+ if (SUCCESS == zend_hash_find(&(PHAR_GLOBALS->phar_alias_map), actual_alias, mydata->alias_len, (void **)&fd_ptr)) {
+ if (SUCCESS != phar_free_alias(*fd_ptr, actual_alias, mydata->alias_len TSRMLS_CC)) {
+ if (error) {
+ spprintf(error, 4096, "phar error: Unable to add zip-based phar \"%s\" with implicit alias, alias is already in use", fname);
+ }
+ efree(actual_alias);
+ zend_hash_del(&(PHAR_GLOBALS->phar_fname_map), mydata->fname, fname_len);
+ return FAILURE;
+ }
+ }
+
+ mydata->alias = entry.is_persistent ? pestrndup(actual_alias, mydata->alias_len, 1) : actual_alias;
+
+ if (entry.is_persistent) {
+ efree(actual_alias);
+ }
+
+ zend_hash_add(&(PHAR_GLOBALS->phar_alias_map), actual_alias, mydata->alias_len, (void*)&mydata, sizeof(phar_archive_data*), NULL);
+ } else {
+ phar_archive_data **fd_ptr;
+
+ if (alias_len) {
+ if (SUCCESS == zend_hash_find(&(PHAR_GLOBALS->phar_alias_map), alias, alias_len, (void **)&fd_ptr)) {
+ if (SUCCESS != phar_free_alias(*fd_ptr, alias, alias_len TSRMLS_CC)) {
+ if (error) {
+ spprintf(error, 4096, "phar error: Unable to add zip-based phar \"%s\" with explicit alias, alias is already in use", fname);
+ }
+ zend_hash_del(&(PHAR_GLOBALS->phar_fname_map), mydata->fname, fname_len);
+ return FAILURE;
+ }
+ }
+
+ zend_hash_add(&(PHAR_GLOBALS->phar_alias_map), actual_alias, mydata->alias_len, (void*)&mydata, sizeof(phar_archive_data*), NULL);
+ mydata->alias = pestrndup(alias, alias_len, mydata->is_persistent);
+ mydata->alias_len = alias_len;
+ } else {
+ mydata->alias = pestrndup(mydata->fname, fname_len, mydata->is_persistent);
+ mydata->alias_len = fname_len;
+ }
+
+ mydata->is_temporary_alias = 1;
+ }
+
+ if (pphar) {
+ *pphar = mydata;
+ }
+
+ return SUCCESS;
+}
+/* }}} */
+
+/**
+ * Create or open a zip-based phar for writing
+ */
+int phar_open_or_create_zip(char *fname, int fname_len, char *alias, int alias_len, int is_data, int options, phar_archive_data** pphar, char **error TSRMLS_DC) /* {{{ */
+{
+ phar_archive_data *phar;
+ int ret = phar_create_or_parse_filename(fname, fname_len, alias, alias_len, is_data, options, &phar, error TSRMLS_CC);
+
+ if (FAILURE == ret) {
+ return FAILURE;
+ }
+
+ if (pphar) {
+ *pphar = phar;
+ }
+
+ phar->is_data = is_data;
+
+ if (phar->is_zip) {
+ return ret;
+ }
+
+ if (phar->is_brandnew) {
+ phar->internal_file_start = 0;
+ phar->is_zip = 1;
+ phar->is_tar = 0;
+ return SUCCESS;
+ }
+
+ /* we've reached here - the phar exists and is a regular phar */
+ if (error) {
+ spprintf(error, 4096, "phar zip error: phar \"%s\" already exists as a regular phar and must be deleted from disk prior to creating as a zip-based phar", fname);
+ }
+
+ return FAILURE;
+}
+/* }}} */
+
+struct _phar_zip_pass {
+ php_stream *filefp;
+ php_stream *centralfp;
+ php_stream *old;
+ int free_fp;
+ int free_ufp;
+ char **error;
+};
+/* perform final modification of zip contents for each file in the manifest before saving */
+static int phar_zip_changed_apply(void *data, void *arg TSRMLS_DC) /* {{{ */
+{
+ phar_entry_info *entry;
+ phar_zip_file_header local;
+ phar_zip_unix3 perms;
+ phar_zip_central_dir_file central;
+ struct _phar_zip_pass *p;
+ php_uint32 newcrc32;
+ off_t offset;
+ int not_really_modified = 0;
+ entry = (phar_entry_info *)data;
+ p = (struct _phar_zip_pass*) arg;
+
+ if (entry->is_mounted) {
+ return ZEND_HASH_APPLY_KEEP;
+ }
+
+ if (entry->is_deleted) {
+ if (entry->fp_refcount <= 0) {
+ return ZEND_HASH_APPLY_REMOVE;
+ } else {
+ /* we can't delete this in-memory until it is closed */
+ return ZEND_HASH_APPLY_KEEP;
+ }
+ }
+
+ phar_add_virtual_dirs(entry->phar, entry->filename, entry->filename_len TSRMLS_CC);
+ memset(&local, 0, sizeof(local));
+ memset(&central, 0, sizeof(central));
+ memset(&perms, 0, sizeof(perms));
+ strncpy(local.signature, "PK\3\4", 4);
+ strncpy(central.signature, "PK\1\2", 4);
+ PHAR_SET_16(central.extra_len, sizeof(perms));
+ PHAR_SET_16(local.extra_len, sizeof(perms));
+ perms.tag[0] = 'n';
+ perms.tag[1] = 'u';
+ PHAR_SET_16(perms.size, sizeof(perms) - 4);
+ PHAR_SET_16(perms.perms, entry->flags & PHAR_ENT_PERM_MASK);
+ {
+ php_uint32 crc = (php_uint32) ~0;
+ CRC32(crc, perms.perms[0]);
+ CRC32(crc, perms.perms[1]);
+ PHAR_SET_32(perms.crc32, ~crc);
+ }
+
+ if (entry->flags & PHAR_ENT_COMPRESSED_GZ) {
+ PHAR_SET_16(central.compressed, PHAR_ZIP_COMP_DEFLATE);
+ PHAR_SET_16(local.compressed, PHAR_ZIP_COMP_DEFLATE);
+ }
+
+ if (entry->flags & PHAR_ENT_COMPRESSED_BZ2) {
+ PHAR_SET_16(central.compressed, PHAR_ZIP_COMP_BZIP2);
+ PHAR_SET_16(local.compressed, PHAR_ZIP_COMP_BZIP2);
+ }
+
+ /* do not use PHAR_GET_16 on either field of the next line */
+ phar_zip_u2d_time(entry->timestamp, local.timestamp, local.datestamp);
+ memcpy(central.timestamp, local.timestamp, sizeof(local.timestamp));
+ memcpy(central.datestamp, local.datestamp, sizeof(local.datestamp));
+ PHAR_SET_16(central.filename_len, entry->filename_len + (entry->is_dir ? 1 : 0));
+ PHAR_SET_16(local.filename_len, entry->filename_len + (entry->is_dir ? 1 : 0));
+ PHAR_SET_32(central.offset, php_stream_tell(p->filefp));
+
+ /* do extra field for perms later */
+ if (entry->is_modified) {
+ php_uint32 loc;
+ php_stream_filter *filter;
+ php_stream *efp;
+
+ if (entry->is_dir) {
+ entry->is_modified = 0;
+ if (entry->fp_type == PHAR_MOD && entry->fp != entry->phar->fp && entry->fp != entry->phar->ufp) {
+ php_stream_close(entry->fp);
+ entry->fp = NULL;
+ entry->fp_type = PHAR_FP;
+ }
+ goto continue_dir;
+ }
+
+ if (FAILURE == phar_open_entry_fp(entry, p->error, 0 TSRMLS_CC)) {
+ spprintf(p->error, 0, "unable to open file contents of file \"%s\" in zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ /* we can be modified and already be compressed, such as when chmod() is executed */
+ if (entry->flags & PHAR_ENT_COMPRESSION_MASK && (entry->old_flags == entry->flags || !entry->old_flags)) {
+ not_really_modified = 1;
+ goto is_compressed;
+ }
+
+ if (-1 == phar_seek_efp(entry, 0, SEEK_SET, 0, 0 TSRMLS_CC)) {
+ spprintf(p->error, 0, "unable to seek to start of file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ efp = phar_get_efp(entry, 0 TSRMLS_CC);
+ newcrc32 = ~0;
+
+ for (loc = 0;loc < entry->uncompressed_filesize; ++loc) {
+ CRC32(newcrc32, php_stream_getc(efp));
+ }
+
+ entry->crc32 = ~newcrc32;
+ PHAR_SET_32(central.uncompsize, entry->uncompressed_filesize);
+ PHAR_SET_32(local.uncompsize, entry->uncompressed_filesize);
+
+ if (!(entry->flags & PHAR_ENT_COMPRESSION_MASK)) {
+ /* not compressed */
+ entry->compressed_filesize = entry->uncompressed_filesize;
+ PHAR_SET_32(central.compsize, entry->uncompressed_filesize);
+ PHAR_SET_32(local.compsize, entry->uncompressed_filesize);
+ goto not_compressed;
+ }
+
+ filter = php_stream_filter_create(phar_compress_filter(entry, 0), NULL, 0 TSRMLS_CC);
+
+ if (!filter) {
+ if (entry->flags & PHAR_ENT_COMPRESSED_GZ) {
+ spprintf(p->error, 0, "unable to gzip compress file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ } else {
+ spprintf(p->error, 0, "unable to bzip2 compress file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ }
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ /* create new file that holds the compressed version */
+ /* work around inability to specify freedom in write and strictness
+ in read count */
+ entry->cfp = php_stream_fopen_tmpfile();
+
+ if (!entry->cfp) {
+ spprintf(p->error, 0, "unable to create temporary file for file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ php_stream_flush(efp);
+
+ if (-1 == phar_seek_efp(entry, 0, SEEK_SET, 0, 0 TSRMLS_CC)) {
+ spprintf(p->error, 0, "unable to seek to start of file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ php_stream_filter_append((&entry->cfp->writefilters), filter);
+
+ if (SUCCESS != phar_stream_copy_to_stream(efp, entry->cfp, entry->uncompressed_filesize, NULL)) {
+ spprintf(p->error, 0, "unable to copy compressed file contents of file \"%s\" while creating new phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ php_stream_filter_flush(filter, 1);
+ php_stream_flush(entry->cfp);
+ php_stream_filter_remove(filter, 1 TSRMLS_CC);
+ php_stream_seek(entry->cfp, 0, SEEK_END);
+ entry->compressed_filesize = (php_uint32) php_stream_tell(entry->cfp);
+ PHAR_SET_32(central.compsize, entry->compressed_filesize);
+ PHAR_SET_32(local.compsize, entry->compressed_filesize);
+ /* generate crc on compressed file */
+ php_stream_rewind(entry->cfp);
+ entry->old_flags = entry->flags;
+ entry->is_modified = 1;
+ } else {
+is_compressed:
+ PHAR_SET_32(central.uncompsize, entry->uncompressed_filesize);
+ PHAR_SET_32(local.uncompsize, entry->uncompressed_filesize);
+ PHAR_SET_32(central.compsize, entry->compressed_filesize);
+ PHAR_SET_32(local.compsize, entry->compressed_filesize);
+
+ if (-1 == php_stream_seek(p->old, entry->offset_abs, SEEK_SET)) {
+ spprintf(p->error, 0, "unable to seek to start of file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+ }
+not_compressed:
+ PHAR_SET_32(central.crc32, entry->crc32);
+ PHAR_SET_32(local.crc32, entry->crc32);
+continue_dir:
+ /* set file metadata */
+ if (entry->metadata) {
+ php_serialize_data_t metadata_hash;
+
+ if (entry->metadata_str.c) {
+ smart_str_free(&entry->metadata_str);
+ }
+ entry->metadata_str.c = 0;
+ entry->metadata_str.len = 0;
+ PHP_VAR_SERIALIZE_INIT(metadata_hash);
+ php_var_serialize(&entry->metadata_str, &entry->metadata, &metadata_hash TSRMLS_CC);
+ PHP_VAR_SERIALIZE_DESTROY(metadata_hash);
+ PHAR_SET_16(central.comment_len, entry->metadata_str.len);
+ }
+
+ entry->header_offset = php_stream_tell(p->filefp);
+ offset = entry->header_offset + sizeof(local) + entry->filename_len + (entry->is_dir ? 1 : 0) + sizeof(perms);
+
+ if (sizeof(local) != php_stream_write(p->filefp, (char *)&local, sizeof(local))) {
+ spprintf(p->error, 0, "unable to write local file header of file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (sizeof(central) != php_stream_write(p->centralfp, (char *)&central, sizeof(central))) {
+ spprintf(p->error, 0, "unable to write central directory entry for file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (entry->is_dir) {
+ if (entry->filename_len != php_stream_write(p->filefp, entry->filename, entry->filename_len)) {
+ spprintf(p->error, 0, "unable to write filename to local directory entry for directory \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (1 != php_stream_write(p->filefp, "/", 1)) {
+ spprintf(p->error, 0, "unable to write filename to local directory entry for directory \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (entry->filename_len != php_stream_write(p->centralfp, entry->filename, entry->filename_len)) {
+ spprintf(p->error, 0, "unable to write filename to central directory entry for directory \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (1 != php_stream_write(p->centralfp, "/", 1)) {
+ spprintf(p->error, 0, "unable to write filename to central directory entry for directory \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+ } else {
+ if (entry->filename_len != php_stream_write(p->filefp, entry->filename, entry->filename_len)) {
+ spprintf(p->error, 0, "unable to write filename to local directory entry for file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (entry->filename_len != php_stream_write(p->centralfp, entry->filename, entry->filename_len)) {
+ spprintf(p->error, 0, "unable to write filename to central directory entry for file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+ }
+
+ if (sizeof(perms) != php_stream_write(p->filefp, (char *)&perms, sizeof(perms))) {
+ spprintf(p->error, 0, "unable to write local extra permissions file header of file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (sizeof(perms) != php_stream_write(p->centralfp, (char *)&perms, sizeof(perms))) {
+ spprintf(p->error, 0, "unable to write central extra permissions file header of file \"%s\" to zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ if (!not_really_modified && entry->is_modified) {
+ if (entry->cfp) {
+ if (SUCCESS != phar_stream_copy_to_stream(entry->cfp, p->filefp, entry->compressed_filesize, NULL)) {
+ spprintf(p->error, 0, "unable to write compressed contents of file \"%s\" in zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ php_stream_close(entry->cfp);
+ entry->cfp = NULL;
+ } else {
+ if (FAILURE == phar_open_entry_fp(entry, p->error, 0 TSRMLS_CC)) {
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ phar_seek_efp(entry, 0, SEEK_SET, 0, 0 TSRMLS_CC);
+
+ if (SUCCESS != phar_stream_copy_to_stream(phar_get_efp(entry, 0 TSRMLS_CC), p->filefp, entry->uncompressed_filesize, NULL)) {
+ spprintf(p->error, 0, "unable to write contents of file \"%s\" in zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+ }
+
+ if (entry->fp_type == PHAR_MOD && entry->fp != entry->phar->fp && entry->fp != entry->phar->ufp && entry->fp_refcount == 0) {
+ php_stream_close(entry->fp);
+ }
+
+ entry->is_modified = 0;
+ } else {
+ entry->is_modified = 0;
+ if (entry->fp_refcount) {
+ /* open file pointers refer to this fp, do not free the stream */
+ switch (entry->fp_type) {
+ case PHAR_FP:
+ p->free_fp = 0;
+ break;
+ case PHAR_UFP:
+ p->free_ufp = 0;
+ default:
+ break;
+ }
+ }
+
+ if (!entry->is_dir && entry->compressed_filesize && SUCCESS != phar_stream_copy_to_stream(p->old, p->filefp, entry->compressed_filesize, NULL)) {
+ spprintf(p->error, 0, "unable to copy contents of file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ return ZEND_HASH_APPLY_STOP;
+ }
+ }
+
+ entry->fp = NULL;
+ entry->offset = entry->offset_abs = offset;
+ entry->fp_type = PHAR_FP;
+
+ if (entry->metadata_str.c) {
+ if (entry->metadata_str.len != php_stream_write(p->centralfp, entry->metadata_str.c, entry->metadata_str.len)) {
+ spprintf(p->error, 0, "unable to write metadata as file comment for file \"%s\" while creating zip-based phar \"%s\"", entry->filename, entry->phar->fname);
+ smart_str_free(&entry->metadata_str);
+ return ZEND_HASH_APPLY_STOP;
+ }
+
+ smart_str_free(&entry->metadata_str);
+ }
+
+ return ZEND_HASH_APPLY_KEEP;
+}
+/* }}} */
+
+static int phar_zip_applysignature(phar_archive_data *phar, struct _phar_zip_pass *pass,
+ smart_str *metadata TSRMLS_DC) /* {{{ */
+{
+ /* add signature for executable tars or tars explicitly set with setSignatureAlgorithm */
+ if (!phar->is_data || phar->sig_flags) {
+ int signature_length;
+ char *signature, sigbuf[8];
+ phar_entry_info entry = {0};
+ php_stream *newfile;
+ off_t tell, st;
+
+ newfile = php_stream_fopen_tmpfile();
+ st = tell = php_stream_tell(pass->filefp);
+ /* copy the local files, central directory, and the zip comment to generate the hash */
+ php_stream_seek(pass->filefp, 0, SEEK_SET);
+ phar_stream_copy_to_stream(pass->filefp, newfile, tell, NULL);
+ tell = php_stream_tell(pass->centralfp);
+ php_stream_seek(pass->centralfp, 0, SEEK_SET);
+ phar_stream_copy_to_stream(pass->centralfp, newfile, tell, NULL);
+ if (metadata->c) {
+ php_stream_write(newfile, metadata->c, metadata->len);
+ }
+
+ if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, pass->error TSRMLS_CC)) {
+ if (pass->error) {
+ char *save = *(pass->error);
+ spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar: %s", save);
+ efree(save);
+ }
+
+ php_stream_close(newfile);
+ return FAILURE;
+ }
+
+ entry.filename = ".phar/signature.bin";
+ entry.filename_len = sizeof(".phar/signature.bin")-1;
+ entry.fp = php_stream_fopen_tmpfile();
+ entry.fp_type = PHAR_MOD;
+ entry.is_modified = 1;
+
+ PHAR_SET_32(sigbuf, phar->sig_flags);
+ PHAR_SET_32(sigbuf + 4, signature_length);
+
+ if (8 != (int)php_stream_write(entry.fp, sigbuf, 8) || signature_length != (int)php_stream_write(entry.fp, signature, signature_length)) {
+ efree(signature);
+ if (pass->error) {
+ spprintf(pass->error, 0, "phar error: unable to write signature to zip-based phar %s", phar->fname);
+ }
+
+ php_stream_close(newfile);
+ return FAILURE;
+ }
+
+ efree(signature);
+ entry.uncompressed_filesize = entry.compressed_filesize = signature_length + 8;
+ entry.phar = phar;
+ /* throw out return value and write the signature */
+ phar_zip_changed_apply((void *)&entry, (void *)pass TSRMLS_CC);
+ php_stream_close(newfile);
+
+ if (pass->error && *(pass->error)) {
+ /* error is set by writeheaders */
+ php_stream_close(newfile);
+ return FAILURE;
+ }
+ } /* signature */
+ return SUCCESS;
+}
+/* }}} */
+
+int phar_zip_flush(phar_archive_data *phar, char *user_stub, long len, int defaultstub, char **error TSRMLS_DC) /* {{{ */
+{
+ char *pos;
+ smart_str main_metadata_str = {0};
+ static const char newstub[] = "<?php // zip-based phar archive stub file\n__HALT_COMPILER();";
+ char halt_stub[] = "__HALT_COMPILER();";
+ char *tmp;
+
+ php_stream *stubfile, *oldfile;
+ php_serialize_data_t metadata_hash;
+ int free_user_stub, closeoldfile = 0;
+ phar_entry_info entry = {0};
+ char *temperr = NULL;
+ struct _phar_zip_pass pass;
+ phar_zip_dir_end eocd;
+ php_uint32 cdir_size, cdir_offset;
+
+ pass.error = &temperr;
+ entry.flags = PHAR_ENT_PERM_DEF_FILE;
+ entry.timestamp = time(NULL);
+ entry.is_modified = 1;
+ entry.is_zip = 1;
+ entry.phar = phar;
+ entry.fp_type = PHAR_MOD;
+
+ if (phar->is_persistent) {
+ if (error) {
+ spprintf(error, 0, "internal error: attempt to flush cached zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+
+ if (phar->is_data) {
+ goto nostub;
+ }
+
+ /* set alias */
+ if (!phar->is_temporary_alias && phar->alias_len) {
+ entry.fp = php_stream_fopen_tmpfile();
+
+ if (phar->alias_len != (int)php_stream_write(entry.fp, phar->alias, phar->alias_len)) {
+ if (error) {
+ spprintf(error, 0, "unable to set alias in zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+
+ entry.uncompressed_filesize = entry.compressed_filesize = phar->alias_len;
+ entry.filename = estrndup(".phar/alias.txt", sizeof(".phar/alias.txt")-1);
+ entry.filename_len = sizeof(".phar/alias.txt")-1;
+
+ if (SUCCESS != zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
+ if (error) {
+ spprintf(error, 0, "unable to set alias in zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+ } else {
+ zend_hash_del(&phar->manifest, ".phar/alias.txt", sizeof(".phar/alias.txt")-1);
+ }
+
+ /* register alias */
+ if (phar->alias_len) {
+ if (FAILURE == phar_get_archive(&phar, phar->fname, phar->fname_len, phar->alias, phar->alias_len, error TSRMLS_CC)) {
+ return EOF;
+ }
+ }
+
+ /* set stub */
+ if (user_stub && !defaultstub) {
+ if (len < 0) {
+ /* resource passed in */
+ if (!(php_stream_from_zval_no_verify(stubfile, (zval **)user_stub))) {
+ if (error) {
+ spprintf(error, 0, "unable to access resource to copy stub to new zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+
+ if (len == -1) {
+ len = PHP_STREAM_COPY_ALL;
+ } else {
+ len = -len;
+ }
+
+ user_stub = 0;
+
+ if (!(len = php_stream_copy_to_mem(stubfile, &user_stub, len, 0)) || !user_stub) {
+ if (error) {
+ spprintf(error, 0, "unable to read resource to copy stub to new zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+ free_user_stub = 1;
+ } else {
+ free_user_stub = 0;
+ }
+
+ tmp = estrndup(user_stub, len);
+ if ((pos = php_stristr(tmp, halt_stub, len, sizeof(halt_stub) - 1)) == NULL) {
+ efree(tmp);
+ if (error) {
+ spprintf(error, 0, "illegal stub for zip-based phar \"%s\"", phar->fname);
+ }
+ if (free_user_stub) {
+ efree(user_stub);
+ }
+ return EOF;
+ }
+ pos = user_stub + (pos - tmp);
+ efree(tmp);
+
+ len = pos - user_stub + 18;
+ entry.fp = php_stream_fopen_tmpfile();
+ entry.uncompressed_filesize = len + 5;
+
+ if ((size_t)len != php_stream_write(entry.fp, user_stub, len)
+ || 5 != php_stream_write(entry.fp, " ?>\r\n", 5)) {
+ if (error) {
+ spprintf(error, 0, "unable to create stub from string in new zip-based phar \"%s\"", phar->fname);
+ }
+ if (free_user_stub) {
+ efree(user_stub);
+ }
+ php_stream_close(entry.fp);
+ return EOF;
+ }
+
+ entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
+ entry.filename_len = sizeof(".phar/stub.php")-1;
+
+ if (SUCCESS != zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
+ if (free_user_stub) {
+ efree(user_stub);
+ }
+ if (error) {
+ spprintf(error, 0, "unable to set stub in zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+
+ if (free_user_stub) {
+ efree(user_stub);
+ }
+ } else {
+ /* Either this is a brand new phar (add the stub), or the default stub is required (overwrite the stub) */
+ entry.fp = php_stream_fopen_tmpfile();
+
+ if (sizeof(newstub)-1 != php_stream_write(entry.fp, newstub, sizeof(newstub)-1)) {
+ php_stream_close(entry.fp);
+ if (error) {
+ spprintf(error, 0, "unable to %s stub in%szip-based phar \"%s\", failed", user_stub ? "overwrite" : "create", user_stub ? " " : " new ", phar->fname);
+ }
+ return EOF;
+ }
+
+ entry.uncompressed_filesize = entry.compressed_filesize = sizeof(newstub) - 1;
+ entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
+ entry.filename_len = sizeof(".phar/stub.php")-1;
+
+ if (!defaultstub) {
+ if (!zend_hash_exists(&phar->manifest, ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
+ if (SUCCESS != zend_hash_add(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
+ php_stream_close(entry.fp);
+ efree(entry.filename);
+ if (error) {
+ spprintf(error, 0, "unable to create stub in zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+ } else {
+ php_stream_close(entry.fp);
+ efree(entry.filename);
+ }
+ } else {
+ if (SUCCESS != zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
+ php_stream_close(entry.fp);
+ efree(entry.filename);
+ if (error) {
+ spprintf(error, 0, "unable to overwrite stub in zip-based phar \"%s\"", phar->fname);
+ }
+ return EOF;
+ }
+ }
+ }
+nostub:
+ if (phar->fp && !phar->is_brandnew) {
+ oldfile = phar->fp;
+ closeoldfile = 0;
+ php_stream_rewind(oldfile);
+ } else {
+ oldfile = php_stream_open_wrapper(phar->fname, "rb", 0, NULL);
+ closeoldfile = oldfile != NULL;
+ }
+
+ /* save modified files to the zip */
+ pass.old = oldfile;
+ pass.filefp = php_stream_fopen_tmpfile();
+
+ if (!pass.filefp) {
+fperror:
+ if (closeoldfile) {
+ php_stream_close(oldfile);
+ }
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: unable to open temporary file", phar->fname);
+ }
+ return EOF;
+ }
+
+ pass.centralfp = php_stream_fopen_tmpfile();
+
+ if (!pass.centralfp) {
+ goto fperror;
+ }
+
+ pass.free_fp = pass.free_ufp = 1;
+ memset(&eocd, 0, sizeof(eocd));
+
+ strncpy(eocd.signature, "PK\5\6", 4);
+ if (!phar->is_data && !phar->sig_flags) {
+ phar->sig_flags = PHAR_SIG_SHA1;
+ }
+ if (phar->sig_flags) {
+ PHAR_SET_16(eocd.counthere, zend_hash_num_elements(&phar->manifest) + 1);
+ PHAR_SET_16(eocd.count, zend_hash_num_elements(&phar->manifest) + 1);
+ } else {
+ PHAR_SET_16(eocd.counthere, zend_hash_num_elements(&phar->manifest));
+ PHAR_SET_16(eocd.count, zend_hash_num_elements(&phar->manifest));
+ }
+ zend_hash_apply_with_argument(&phar->manifest, phar_zip_changed_apply, (void *) &pass TSRMLS_CC);
+
+ if (phar->metadata) {
+ /* set phar metadata */
+ PHP_VAR_SERIALIZE_INIT(metadata_hash);
+ php_var_serialize(&main_metadata_str, &phar->metadata, &metadata_hash TSRMLS_CC);
+ PHP_VAR_SERIALIZE_DESTROY(metadata_hash);
+ }
+ if (temperr) {
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: %s", phar->fname, temperr);
+ }
+ efree(temperr);
+temperror:
+ php_stream_close(pass.centralfp);
+nocentralerror:
+ if (phar->metadata) {
+ smart_str_free(&main_metadata_str);
+ }
+ php_stream_close(pass.filefp);
+ if (closeoldfile) {
+ php_stream_close(oldfile);
+ }
+ return EOF;
+ }
+
+ if (FAILURE == phar_zip_applysignature(phar, &pass, &main_metadata_str TSRMLS_CC)) {
+ goto temperror;
+ }
+
+ /* save zip */
+ cdir_size = php_stream_tell(pass.centralfp);
+ cdir_offset = php_stream_tell(pass.filefp);
+ PHAR_SET_32(eocd.cdir_size, cdir_size);
+ PHAR_SET_32(eocd.cdir_offset, cdir_offset);
+ php_stream_seek(pass.centralfp, 0, SEEK_SET);
+
+ {
+ size_t clen;
+ int ret = phar_stream_copy_to_stream(pass.centralfp, pass.filefp, PHP_STREAM_COPY_ALL, &clen);
+ if (SUCCESS != ret || clen != cdir_size) {
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: unable to write central-directory", phar->fname);
+ }
+ goto temperror;
+ }
+ }
+
+ php_stream_close(pass.centralfp);
+
+ if (phar->metadata) {
+ /* set phar metadata */
+ PHAR_SET_16(eocd.comment_len, main_metadata_str.len);
+
+ if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: unable to write end of central-directory", phar->fname);
+ }
+ goto nocentralerror;
+ }
+
+ if (main_metadata_str.len != php_stream_write(pass.filefp, main_metadata_str.c, main_metadata_str.len)) {
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: unable to write metadata to zip comment", phar->fname);
+ }
+ goto nocentralerror;
+ }
+
+ smart_str_free(&main_metadata_str);
+
+ } else {
+ if (sizeof(eocd) != php_stream_write(pass.filefp, (char *)&eocd, sizeof(eocd))) {
+ if (error) {
+ spprintf(error, 4096, "phar zip flush of \"%s\" failed: unable to write end of central-directory", phar->fname);
+ }
+ goto nocentralerror;
+ }
+ }
+
+ if (phar->fp && pass.free_fp) {
+ php_stream_close(phar->fp);
+ }
+
+ if (phar->ufp) {
+ if (pass.free_ufp) {
+ php_stream_close(phar->ufp);
+ }
+ phar->ufp = NULL;
+ }
+
+ /* re-open */
+ phar->is_brandnew = 0;
+
+ if (phar->donotflush) {
+ /* deferred flush */
+ phar->fp = pass.filefp;
+ } else {
+ phar->fp = php_stream_open_wrapper(phar->fname, "w+b", IGNORE_URL|STREAM_MUST_SEEK|REPORT_ERRORS, NULL);
+ if (!phar->fp) {
+ if (closeoldfile) {
+ php_stream_close(oldfile);
+ }
+ phar->fp = pass.filefp;
+ if (error) {
+ spprintf(error, 4096, "unable to open new phar \"%s\" for writing", phar->fname);
+ }
+ return EOF;
+ }
+ php_stream_rewind(pass.filefp);
+ phar_stream_copy_to_stream(pass.filefp, phar->fp, PHP_STREAM_COPY_ALL, NULL);
+ /* we could also reopen the file in "rb" mode but there is no need for that */
+ php_stream_close(pass.filefp);
+ }
+
+ if (closeoldfile) {
+ php_stream_close(oldfile);
+ }
+ return EOF;
+}
+/* }}} */
+
+/*
+ * Local variables:
+ * tab-width: 4
+ * c-basic-offset: 4
+ * End:
+ * vim600: noet sw=4 ts=4 fdm=marker
+ * vim<600: noet sw=4 ts=4
+ */