lg_pod_plugin 1.0.7 → 1.0.10
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/bin/lg +5 -0
- data/lib/command/cache.rb +22 -18
- data/lib/command/command.rb +27 -35
- data/lib/command/install.rb +52 -0
- data/lib/command/update.rb +39 -0
- data/lib/lg_pod_plugin/downloader.rb +12 -17
- data/lib/lg_pod_plugin/git_util.rb +150 -106
- data/lib/lg_pod_plugin/install.rb +74 -88
- data/lib/lg_pod_plugin/l_cache.rb +11 -77
- data/lib/lg_pod_plugin/l_util.rb +6 -2
- data/lib/lg_pod_plugin/request.rb +90 -82
- data/lib/lg_pod_plugin/version.rb +1 -1
- data/lib/lg_pod_plugin.rb +11 -7
- metadata +57 -118
- data/lib/git/author.rb +0 -14
- data/lib/git/base/factory.rb +0 -101
- data/lib/git/base.rb +0 -670
- data/lib/git/branch.rb +0 -126
- data/lib/git/branches.rb +0 -71
- data/lib/git/config.rb +0 -22
- data/lib/git/diff.rb +0 -155
- data/lib/git/encoding_utils.rb +0 -33
- data/lib/git/escaped_path.rb +0 -77
- data/lib/git/index.rb +0 -5
- data/lib/git/lib.rb +0 -1215
- data/lib/git/log.rb +0 -135
- data/lib/git/object.rb +0 -312
- data/lib/git/path.rb +0 -31
- data/lib/git/remote.rb +0 -36
- data/lib/git/repository.rb +0 -6
- data/lib/git/stash.rb +0 -27
- data/lib/git/stashes.rb +0 -55
- data/lib/git/status.rb +0 -199
- data/lib/git/url.rb +0 -127
- data/lib/git/version.rb +0 -5
- data/lib/git/working_directory.rb +0 -4
- data/lib/git/worktree.rb +0 -38
- data/lib/git/worktrees.rb +0 -47
- data/lib/git.rb +0 -326
- data/lib/rchardet/big5freq.rb +0 -927
- data/lib/rchardet/big5prober.rb +0 -42
- data/lib/rchardet/chardistribution.rb +0 -250
- data/lib/rchardet/charsetgroupprober.rb +0 -110
- data/lib/rchardet/charsetprober.rb +0 -70
- data/lib/rchardet/codingstatemachine.rb +0 -67
- data/lib/rchardet/constants.rb +0 -42
- data/lib/rchardet/escprober.rb +0 -90
- data/lib/rchardet/escsm.rb +0 -245
- data/lib/rchardet/eucjpprober.rb +0 -88
- data/lib/rchardet/euckrfreq.rb +0 -597
- data/lib/rchardet/euckrprober.rb +0 -42
- data/lib/rchardet/euctwfreq.rb +0 -431
- data/lib/rchardet/euctwprober.rb +0 -42
- data/lib/rchardet/gb18030freq.rb +0 -474
- data/lib/rchardet/gb18030prober.rb +0 -42
- data/lib/rchardet/hebrewprober.rb +0 -289
- data/lib/rchardet/jisfreq.rb +0 -571
- data/lib/rchardet/jpcntx.rb +0 -229
- data/lib/rchardet/langbulgarianmodel.rb +0 -229
- data/lib/rchardet/langcyrillicmodel.rb +0 -330
- data/lib/rchardet/langgreekmodel.rb +0 -227
- data/lib/rchardet/langhebrewmodel.rb +0 -202
- data/lib/rchardet/langhungarianmodel.rb +0 -226
- data/lib/rchardet/langthaimodel.rb +0 -201
- data/lib/rchardet/latin1prober.rb +0 -147
- data/lib/rchardet/mbcharsetprober.rb +0 -89
- data/lib/rchardet/mbcsgroupprober.rb +0 -47
- data/lib/rchardet/mbcssm.rb +0 -542
- data/lib/rchardet/sbcharsetprober.rb +0 -122
- data/lib/rchardet/sbcsgroupprober.rb +0 -58
- data/lib/rchardet/sjisprober.rb +0 -88
- data/lib/rchardet/universaldetector.rb +0 -179
- data/lib/rchardet/utf8prober.rb +0 -87
- data/lib/rchardet/version.rb +0 -3
- data/lib/rchardet.rb +0 -67
- data/lib/zip/central_directory.rb +0 -212
- data/lib/zip/compressor.rb +0 -9
- data/lib/zip/constants.rb +0 -115
- data/lib/zip/crypto/decrypted_io.rb +0 -40
- data/lib/zip/crypto/encryption.rb +0 -11
- data/lib/zip/crypto/null_encryption.rb +0 -43
- data/lib/zip/crypto/traditional_encryption.rb +0 -99
- data/lib/zip/decompressor.rb +0 -31
- data/lib/zip/deflater.rb +0 -34
- data/lib/zip/dos_time.rb +0 -53
- data/lib/zip/entry.rb +0 -719
- data/lib/zip/entry_set.rb +0 -88
- data/lib/zip/errors.rb +0 -19
- data/lib/zip/extra_field/generic.rb +0 -44
- data/lib/zip/extra_field/ntfs.rb +0 -94
- data/lib/zip/extra_field/old_unix.rb +0 -46
- data/lib/zip/extra_field/universal_time.rb +0 -77
- data/lib/zip/extra_field/unix.rb +0 -39
- data/lib/zip/extra_field/zip64.rb +0 -70
- data/lib/zip/extra_field/zip64_placeholder.rb +0 -15
- data/lib/zip/extra_field.rb +0 -103
- data/lib/zip/file.rb +0 -468
- data/lib/zip/filesystem.rb +0 -643
- data/lib/zip/inflater.rb +0 -54
- data/lib/zip/input_stream.rb +0 -180
- data/lib/zip/ioextras/abstract_input_stream.rb +0 -122
- data/lib/zip/ioextras/abstract_output_stream.rb +0 -43
- data/lib/zip/ioextras.rb +0 -36
- data/lib/zip/null_compressor.rb +0 -15
- data/lib/zip/null_decompressor.rb +0 -19
- data/lib/zip/null_input_stream.rb +0 -10
- data/lib/zip/output_stream.rb +0 -198
- data/lib/zip/pass_thru_compressor.rb +0 -23
- data/lib/zip/pass_thru_decompressor.rb +0 -31
- data/lib/zip/streamable_directory.rb +0 -15
- data/lib/zip/streamable_stream.rb +0 -52
- data/lib/zip/version.rb +0 -3
- data/lib/zip.rb +0 -72
data/lib/zip/entry.rb
DELETED
@@ -1,719 +0,0 @@
|
|
1
|
-
require 'pathname'
|
2
|
-
module Zip
|
3
|
-
class Entry
|
4
|
-
STORED = 0
|
5
|
-
DEFLATED = 8
|
6
|
-
# Language encoding flag (EFS) bit
|
7
|
-
EFS = 0b100000000000
|
8
|
-
|
9
|
-
attr_accessor :comment, :compressed_size, :crc, :extra, :compression_method,
|
10
|
-
:name, :size, :local_header_offset, :zipfile, :fstype, :external_file_attributes,
|
11
|
-
:internal_file_attributes,
|
12
|
-
:gp_flags, :header_signature, :follow_symlinks,
|
13
|
-
:restore_times, :restore_permissions, :restore_ownership,
|
14
|
-
:unix_uid, :unix_gid, :unix_perms,
|
15
|
-
:dirty
|
16
|
-
attr_reader :ftype, :filepath # :nodoc:
|
17
|
-
|
18
|
-
def set_default_vars_values
|
19
|
-
@local_header_offset = 0
|
20
|
-
@local_header_size = nil # not known until local entry is created or read
|
21
|
-
@internal_file_attributes = 1
|
22
|
-
@external_file_attributes = 0
|
23
|
-
@header_signature = ::Zip::CENTRAL_DIRECTORY_ENTRY_SIGNATURE
|
24
|
-
|
25
|
-
@version_needed_to_extract = VERSION_NEEDED_TO_EXTRACT
|
26
|
-
@version = VERSION_MADE_BY
|
27
|
-
|
28
|
-
@ftype = nil # unspecified or unknown
|
29
|
-
@filepath = nil
|
30
|
-
@gp_flags = 0
|
31
|
-
if ::Zip.unicode_names
|
32
|
-
@gp_flags |= EFS
|
33
|
-
@version = 63
|
34
|
-
end
|
35
|
-
@follow_symlinks = false
|
36
|
-
|
37
|
-
@restore_times = false
|
38
|
-
@restore_permissions = false
|
39
|
-
@restore_ownership = false
|
40
|
-
# BUG: need an extra field to support uid/gid's
|
41
|
-
@unix_uid = nil
|
42
|
-
@unix_gid = nil
|
43
|
-
@unix_perms = nil
|
44
|
-
# @posix_acl = nil
|
45
|
-
# @ntfs_acl = nil
|
46
|
-
@dirty = false
|
47
|
-
end
|
48
|
-
|
49
|
-
def check_name(name)
|
50
|
-
return unless name.start_with?('/')
|
51
|
-
|
52
|
-
raise ::Zip::EntryNameError, "Illegal ZipEntry name '#{name}', name must not start with /"
|
53
|
-
end
|
54
|
-
|
55
|
-
def initialize(*args)
|
56
|
-
name = args[1] || ''
|
57
|
-
check_name(name)
|
58
|
-
|
59
|
-
set_default_vars_values
|
60
|
-
@fstype = ::Zip::RUNNING_ON_WINDOWS ? ::Zip::FSTYPE_FAT : ::Zip::FSTYPE_UNIX
|
61
|
-
|
62
|
-
@zipfile = args[0] || ''
|
63
|
-
@name = name
|
64
|
-
@comment = args[2] || ''
|
65
|
-
@extra = args[3] || ''
|
66
|
-
@compressed_size = args[4] || 0
|
67
|
-
@crc = args[5] || 0
|
68
|
-
@compression_method = args[6] || ::Zip::Entry::DEFLATED
|
69
|
-
@size = args[7] || 0
|
70
|
-
@time = args[8] || ::Zip::DOSTime.now
|
71
|
-
|
72
|
-
@ftype = name_is_directory? ? :directory : :file
|
73
|
-
@extra = ::Zip::ExtraField.new(@extra.to_s) unless @extra.kind_of?(::Zip::ExtraField)
|
74
|
-
end
|
75
|
-
|
76
|
-
def encrypted?
|
77
|
-
gp_flags & 1 == 1
|
78
|
-
end
|
79
|
-
|
80
|
-
def incomplete?
|
81
|
-
gp_flags & 8 == 8
|
82
|
-
end
|
83
|
-
|
84
|
-
def time
|
85
|
-
if @extra['UniversalTime']
|
86
|
-
@extra['UniversalTime'].mtime
|
87
|
-
elsif @extra['NTFS']
|
88
|
-
@extra['NTFS'].mtime
|
89
|
-
else
|
90
|
-
# Standard time field in central directory has local time
|
91
|
-
# under archive creator. Then, we can't get timezone.
|
92
|
-
@time
|
93
|
-
end
|
94
|
-
end
|
95
|
-
|
96
|
-
alias mtime time
|
97
|
-
|
98
|
-
def time=(value)
|
99
|
-
unless @extra.member?('UniversalTime') || @extra.member?('NTFS')
|
100
|
-
@extra.create('UniversalTime')
|
101
|
-
end
|
102
|
-
(@extra['UniversalTime'] || @extra['NTFS']).mtime = value
|
103
|
-
@time = value
|
104
|
-
end
|
105
|
-
|
106
|
-
def file_type_is?(type)
|
107
|
-
raise InternalError, "current filetype is unknown: #{inspect}" unless @ftype
|
108
|
-
|
109
|
-
@ftype == type
|
110
|
-
end
|
111
|
-
|
112
|
-
# Dynamic checkers
|
113
|
-
%w[directory file symlink].each do |k|
|
114
|
-
define_method "#{k}?" do
|
115
|
-
file_type_is?(k.to_sym)
|
116
|
-
end
|
117
|
-
end
|
118
|
-
|
119
|
-
def name_is_directory? #:nodoc:all
|
120
|
-
@name.end_with?('/')
|
121
|
-
end
|
122
|
-
|
123
|
-
# Is the name a relative path, free of `..` patterns that could lead to
|
124
|
-
# path traversal attacks? This does NOT handle symlinks; if the path
|
125
|
-
# contains symlinks, this check is NOT enough to guarantee safety.
|
126
|
-
def name_safe?
|
127
|
-
cleanpath = Pathname.new(@name).cleanpath
|
128
|
-
return false unless cleanpath.relative?
|
129
|
-
|
130
|
-
root = ::File::SEPARATOR
|
131
|
-
naive_expanded_path = ::File.join(root, cleanpath.to_s)
|
132
|
-
::File.absolute_path(cleanpath.to_s, root) == naive_expanded_path
|
133
|
-
end
|
134
|
-
|
135
|
-
def local_entry_offset #:nodoc:all
|
136
|
-
local_header_offset + @local_header_size
|
137
|
-
end
|
138
|
-
|
139
|
-
def name_size
|
140
|
-
@name ? @name.bytesize : 0
|
141
|
-
end
|
142
|
-
|
143
|
-
def extra_size
|
144
|
-
@extra ? @extra.local_size : 0
|
145
|
-
end
|
146
|
-
|
147
|
-
def comment_size
|
148
|
-
@comment ? @comment.bytesize : 0
|
149
|
-
end
|
150
|
-
|
151
|
-
def calculate_local_header_size #:nodoc:all
|
152
|
-
LOCAL_ENTRY_STATIC_HEADER_LENGTH + name_size + extra_size
|
153
|
-
end
|
154
|
-
|
155
|
-
# check before rewriting an entry (after file sizes are known)
|
156
|
-
# that we didn't change the header size (and thus clobber file data or something)
|
157
|
-
def verify_local_header_size!
|
158
|
-
return if @local_header_size.nil?
|
159
|
-
|
160
|
-
new_size = calculate_local_header_size
|
161
|
-
raise Error, "local header size changed (#{@local_header_size} -> #{new_size})" if @local_header_size != new_size
|
162
|
-
end
|
163
|
-
|
164
|
-
def cdir_header_size #:nodoc:all
|
165
|
-
CDIR_ENTRY_STATIC_HEADER_LENGTH + name_size +
|
166
|
-
(@extra ? @extra.c_dir_size : 0) + comment_size
|
167
|
-
end
|
168
|
-
|
169
|
-
def next_header_offset #:nodoc:all
|
170
|
-
local_entry_offset + compressed_size + data_descriptor_size
|
171
|
-
end
|
172
|
-
|
173
|
-
# Extracts entry to file dest_path (defaults to @name).
|
174
|
-
# NB: The caller is responsible for making sure dest_path is safe, if it
|
175
|
-
# is passed.
|
176
|
-
def extract(dest_path = nil, &block)
|
177
|
-
if dest_path.nil? && !name_safe?
|
178
|
-
warn "WARNING: skipped '#{@name}' as unsafe."
|
179
|
-
return self
|
180
|
-
end
|
181
|
-
|
182
|
-
dest_path ||= @name
|
183
|
-
block ||= proc { ::Zip.on_exists_proc }
|
184
|
-
|
185
|
-
raise "unknown file type #{inspect}" unless directory? || file? || symlink?
|
186
|
-
|
187
|
-
__send__("create_#{@ftype}", dest_path, &block)
|
188
|
-
self
|
189
|
-
end
|
190
|
-
|
191
|
-
def to_s
|
192
|
-
@name
|
193
|
-
end
|
194
|
-
|
195
|
-
class << self
|
196
|
-
def read_zip_short(io) # :nodoc:
|
197
|
-
io.read(2).unpack1('v')
|
198
|
-
end
|
199
|
-
|
200
|
-
def read_zip_long(io) # :nodoc:
|
201
|
-
io.read(4).unpack1('V')
|
202
|
-
end
|
203
|
-
|
204
|
-
def read_zip_64_long(io) # :nodoc:
|
205
|
-
io.read(8).unpack1('Q<')
|
206
|
-
end
|
207
|
-
|
208
|
-
def read_c_dir_entry(io) #:nodoc:all
|
209
|
-
path = if io.respond_to?(:path)
|
210
|
-
io.path
|
211
|
-
else
|
212
|
-
io
|
213
|
-
end
|
214
|
-
entry = new(path)
|
215
|
-
entry.read_c_dir_entry(io)
|
216
|
-
entry
|
217
|
-
rescue Error
|
218
|
-
nil
|
219
|
-
end
|
220
|
-
|
221
|
-
def read_local_entry(io)
|
222
|
-
entry = new(io)
|
223
|
-
entry.read_local_entry(io)
|
224
|
-
entry
|
225
|
-
rescue Error
|
226
|
-
nil
|
227
|
-
end
|
228
|
-
end
|
229
|
-
|
230
|
-
def unpack_local_entry(buf)
|
231
|
-
@header_signature,
|
232
|
-
@version,
|
233
|
-
@fstype,
|
234
|
-
@gp_flags,
|
235
|
-
@compression_method,
|
236
|
-
@last_mod_time,
|
237
|
-
@last_mod_date,
|
238
|
-
@crc,
|
239
|
-
@compressed_size,
|
240
|
-
@size,
|
241
|
-
@name_length,
|
242
|
-
@extra_length = buf.unpack('VCCvvvvVVVvv')
|
243
|
-
end
|
244
|
-
|
245
|
-
def read_local_entry(io) #:nodoc:all
|
246
|
-
@local_header_offset = io.tell
|
247
|
-
|
248
|
-
static_sized_fields_buf = io.read(::Zip::LOCAL_ENTRY_STATIC_HEADER_LENGTH) || ''
|
249
|
-
|
250
|
-
unless static_sized_fields_buf.bytesize == ::Zip::LOCAL_ENTRY_STATIC_HEADER_LENGTH
|
251
|
-
raise Error, 'Premature end of file. Not enough data for zip entry local header'
|
252
|
-
end
|
253
|
-
|
254
|
-
unpack_local_entry(static_sized_fields_buf)
|
255
|
-
|
256
|
-
unless @header_signature == ::Zip::LOCAL_ENTRY_SIGNATURE
|
257
|
-
raise ::Zip::Error, "Zip local header magic not found at location '#{local_header_offset}'"
|
258
|
-
end
|
259
|
-
|
260
|
-
set_time(@last_mod_date, @last_mod_time)
|
261
|
-
|
262
|
-
@name = io.read(@name_length)
|
263
|
-
extra = io.read(@extra_length)
|
264
|
-
|
265
|
-
@name.tr!('\\', '/')
|
266
|
-
if ::Zip.force_entry_names_encoding
|
267
|
-
@name.force_encoding(::Zip.force_entry_names_encoding)
|
268
|
-
end
|
269
|
-
|
270
|
-
if extra && extra.bytesize != @extra_length
|
271
|
-
raise ::Zip::Error, 'Truncated local zip entry header'
|
272
|
-
end
|
273
|
-
|
274
|
-
if @extra.kind_of?(::Zip::ExtraField)
|
275
|
-
@extra.merge(extra) if extra
|
276
|
-
else
|
277
|
-
@extra = ::Zip::ExtraField.new(extra)
|
278
|
-
end
|
279
|
-
|
280
|
-
parse_zip64_extra(true)
|
281
|
-
@local_header_size = calculate_local_header_size
|
282
|
-
end
|
283
|
-
|
284
|
-
def pack_local_entry
|
285
|
-
zip64 = @extra['Zip64']
|
286
|
-
[::Zip::LOCAL_ENTRY_SIGNATURE,
|
287
|
-
@version_needed_to_extract, # version needed to extract
|
288
|
-
@gp_flags, # @gp_flags
|
289
|
-
@compression_method,
|
290
|
-
@time.to_binary_dos_time, # @last_mod_time
|
291
|
-
@time.to_binary_dos_date, # @last_mod_date
|
292
|
-
@crc,
|
293
|
-
zip64 && zip64.compressed_size ? 0xFFFFFFFF : @compressed_size,
|
294
|
-
zip64 && zip64.original_size ? 0xFFFFFFFF : @size,
|
295
|
-
name_size,
|
296
|
-
@extra ? @extra.local_size : 0].pack('VvvvvvVVVvv')
|
297
|
-
end
|
298
|
-
|
299
|
-
def write_local_entry(io, rewrite = false) #:nodoc:all
|
300
|
-
prep_zip64_extra(true)
|
301
|
-
verify_local_header_size! if rewrite
|
302
|
-
@local_header_offset = io.tell
|
303
|
-
|
304
|
-
io << pack_local_entry
|
305
|
-
|
306
|
-
io << @name
|
307
|
-
io << @extra.to_local_bin if @extra
|
308
|
-
@local_header_size = io.tell - @local_header_offset
|
309
|
-
end
|
310
|
-
|
311
|
-
def unpack_c_dir_entry(buf)
|
312
|
-
@header_signature,
|
313
|
-
@version, # version of encoding software
|
314
|
-
@fstype, # filesystem type
|
315
|
-
@version_needed_to_extract,
|
316
|
-
@gp_flags,
|
317
|
-
@compression_method,
|
318
|
-
@last_mod_time,
|
319
|
-
@last_mod_date,
|
320
|
-
@crc,
|
321
|
-
@compressed_size,
|
322
|
-
@size,
|
323
|
-
@name_length,
|
324
|
-
@extra_length,
|
325
|
-
@comment_length,
|
326
|
-
_, # diskNumberStart
|
327
|
-
@internal_file_attributes,
|
328
|
-
@external_file_attributes,
|
329
|
-
@local_header_offset,
|
330
|
-
@name,
|
331
|
-
@extra,
|
332
|
-
@comment = buf.unpack('VCCvvvvvVVVvvvvvVV')
|
333
|
-
end
|
334
|
-
|
335
|
-
def set_ftype_from_c_dir_entry
|
336
|
-
@ftype = case @fstype
|
337
|
-
when ::Zip::FSTYPE_UNIX
|
338
|
-
@unix_perms = (@external_file_attributes >> 16) & 0o7777
|
339
|
-
case (@external_file_attributes >> 28)
|
340
|
-
when ::Zip::FILE_TYPE_DIR
|
341
|
-
:directory
|
342
|
-
when ::Zip::FILE_TYPE_FILE
|
343
|
-
:file
|
344
|
-
when ::Zip::FILE_TYPE_SYMLINK
|
345
|
-
:symlink
|
346
|
-
else
|
347
|
-
# best case guess for whether it is a file or not
|
348
|
-
# Otherwise this would be set to unknown and that entry would never be able to extracted
|
349
|
-
if name_is_directory?
|
350
|
-
:directory
|
351
|
-
else
|
352
|
-
:file
|
353
|
-
end
|
354
|
-
end
|
355
|
-
else
|
356
|
-
if name_is_directory?
|
357
|
-
:directory
|
358
|
-
else
|
359
|
-
:file
|
360
|
-
end
|
361
|
-
end
|
362
|
-
end
|
363
|
-
|
364
|
-
def check_c_dir_entry_static_header_length(buf)
|
365
|
-
return if buf.bytesize == ::Zip::CDIR_ENTRY_STATIC_HEADER_LENGTH
|
366
|
-
|
367
|
-
raise Error, 'Premature end of file. Not enough data for zip cdir entry header'
|
368
|
-
end
|
369
|
-
|
370
|
-
def check_c_dir_entry_signature
|
371
|
-
return if header_signature == ::Zip::CENTRAL_DIRECTORY_ENTRY_SIGNATURE
|
372
|
-
|
373
|
-
raise Error, "Zip local header magic not found at location '#{local_header_offset}'"
|
374
|
-
end
|
375
|
-
|
376
|
-
def check_c_dir_entry_comment_size
|
377
|
-
return if @comment && @comment.bytesize == @comment_length
|
378
|
-
|
379
|
-
raise ::Zip::Error, 'Truncated cdir zip entry header'
|
380
|
-
end
|
381
|
-
|
382
|
-
def read_c_dir_extra_field(io)
|
383
|
-
if @extra.kind_of?(::Zip::ExtraField)
|
384
|
-
@extra.merge(io.read(@extra_length))
|
385
|
-
else
|
386
|
-
@extra = ::Zip::ExtraField.new(io.read(@extra_length))
|
387
|
-
end
|
388
|
-
end
|
389
|
-
|
390
|
-
def read_c_dir_entry(io) #:nodoc:all
|
391
|
-
static_sized_fields_buf = io.read(::Zip::CDIR_ENTRY_STATIC_HEADER_LENGTH)
|
392
|
-
check_c_dir_entry_static_header_length(static_sized_fields_buf)
|
393
|
-
unpack_c_dir_entry(static_sized_fields_buf)
|
394
|
-
check_c_dir_entry_signature
|
395
|
-
set_time(@last_mod_date, @last_mod_time)
|
396
|
-
@name = io.read(@name_length)
|
397
|
-
if ::Zip.force_entry_names_encoding
|
398
|
-
@name.force_encoding(::Zip.force_entry_names_encoding)
|
399
|
-
end
|
400
|
-
read_c_dir_extra_field(io)
|
401
|
-
@comment = io.read(@comment_length)
|
402
|
-
check_c_dir_entry_comment_size
|
403
|
-
set_ftype_from_c_dir_entry
|
404
|
-
parse_zip64_extra(false)
|
405
|
-
end
|
406
|
-
|
407
|
-
def file_stat(path) # :nodoc:
|
408
|
-
if @follow_symlinks
|
409
|
-
::File.stat(path)
|
410
|
-
else
|
411
|
-
::File.lstat(path)
|
412
|
-
end
|
413
|
-
end
|
414
|
-
|
415
|
-
def get_extra_attributes_from_path(path) # :nodoc:
|
416
|
-
return if Zip::RUNNING_ON_WINDOWS
|
417
|
-
|
418
|
-
stat = file_stat(path)
|
419
|
-
@unix_uid = stat.uid
|
420
|
-
@unix_gid = stat.gid
|
421
|
-
@unix_perms = stat.mode & 0o7777
|
422
|
-
@time = ::Zip::DOSTime.from_time(stat.mtime)
|
423
|
-
end
|
424
|
-
|
425
|
-
def set_unix_attributes_on_path(dest_path)
|
426
|
-
# ignore setuid/setgid bits by default. honor if @restore_ownership
|
427
|
-
unix_perms_mask = 0o1777
|
428
|
-
unix_perms_mask = 0o7777 if @restore_ownership
|
429
|
-
::FileUtils.chmod(@unix_perms & unix_perms_mask, dest_path) if @restore_permissions && @unix_perms
|
430
|
-
::FileUtils.chown(@unix_uid, @unix_gid, dest_path) if @restore_ownership && @unix_uid && @unix_gid && ::Process.egid == 0
|
431
|
-
|
432
|
-
# Restore the timestamp on a file. This will either have come from the
|
433
|
-
# original source file that was copied into the archive, or from the
|
434
|
-
# creation date of the archive if there was no original source file.
|
435
|
-
::FileUtils.touch(dest_path, mtime: time) if @restore_times
|
436
|
-
end
|
437
|
-
|
438
|
-
def set_extra_attributes_on_path(dest_path) # :nodoc:
|
439
|
-
return unless file? || directory?
|
440
|
-
|
441
|
-
case @fstype
|
442
|
-
when ::Zip::FSTYPE_UNIX
|
443
|
-
set_unix_attributes_on_path(dest_path)
|
444
|
-
end
|
445
|
-
end
|
446
|
-
|
447
|
-
def pack_c_dir_entry
|
448
|
-
zip64 = @extra['Zip64']
|
449
|
-
[
|
450
|
-
@header_signature,
|
451
|
-
@version, # version of encoding software
|
452
|
-
@fstype, # filesystem type
|
453
|
-
@version_needed_to_extract, # @versionNeededToExtract
|
454
|
-
@gp_flags, # @gp_flags
|
455
|
-
@compression_method,
|
456
|
-
@time.to_binary_dos_time, # @last_mod_time
|
457
|
-
@time.to_binary_dos_date, # @last_mod_date
|
458
|
-
@crc,
|
459
|
-
zip64 && zip64.compressed_size ? 0xFFFFFFFF : @compressed_size,
|
460
|
-
zip64 && zip64.original_size ? 0xFFFFFFFF : @size,
|
461
|
-
name_size,
|
462
|
-
@extra ? @extra.c_dir_size : 0,
|
463
|
-
comment_size,
|
464
|
-
zip64 && zip64.disk_start_number ? 0xFFFF : 0, # disk number start
|
465
|
-
@internal_file_attributes, # file type (binary=0, text=1)
|
466
|
-
@external_file_attributes, # native filesystem attributes
|
467
|
-
zip64 && zip64.relative_header_offset ? 0xFFFFFFFF : @local_header_offset,
|
468
|
-
@name,
|
469
|
-
@extra,
|
470
|
-
@comment
|
471
|
-
].pack('VCCvvvvvVVVvvvvvVV')
|
472
|
-
end
|
473
|
-
|
474
|
-
def write_c_dir_entry(io) #:nodoc:all
|
475
|
-
prep_zip64_extra(false)
|
476
|
-
case @fstype
|
477
|
-
when ::Zip::FSTYPE_UNIX
|
478
|
-
ft = case @ftype
|
479
|
-
when :file
|
480
|
-
@unix_perms ||= 0o644
|
481
|
-
::Zip::FILE_TYPE_FILE
|
482
|
-
when :directory
|
483
|
-
@unix_perms ||= 0o755
|
484
|
-
::Zip::FILE_TYPE_DIR
|
485
|
-
when :symlink
|
486
|
-
@unix_perms ||= 0o755
|
487
|
-
::Zip::FILE_TYPE_SYMLINK
|
488
|
-
end
|
489
|
-
|
490
|
-
unless ft.nil?
|
491
|
-
@external_file_attributes = (ft << 12 | (@unix_perms & 0o7777)) << 16
|
492
|
-
end
|
493
|
-
end
|
494
|
-
|
495
|
-
io << pack_c_dir_entry
|
496
|
-
|
497
|
-
io << @name
|
498
|
-
io << (@extra ? @extra.to_c_dir_bin : '')
|
499
|
-
io << @comment
|
500
|
-
end
|
501
|
-
|
502
|
-
def ==(other)
|
503
|
-
return false unless other.class == self.class
|
504
|
-
|
505
|
-
# Compares contents of local entry and exposed fields
|
506
|
-
keys_equal = %w[compression_method crc compressed_size size name extra filepath].all? do |k|
|
507
|
-
other.__send__(k.to_sym) == __send__(k.to_sym)
|
508
|
-
end
|
509
|
-
keys_equal && time.dos_equals(other.time)
|
510
|
-
end
|
511
|
-
|
512
|
-
def <=>(other)
|
513
|
-
to_s <=> other.to_s
|
514
|
-
end
|
515
|
-
|
516
|
-
# Returns an IO like object for the given ZipEntry.
|
517
|
-
# Warning: may behave weird with symlinks.
|
518
|
-
def get_input_stream(&block)
|
519
|
-
if @ftype == :directory
|
520
|
-
yield ::Zip::NullInputStream if block_given?
|
521
|
-
::Zip::NullInputStream
|
522
|
-
elsif @filepath
|
523
|
-
case @ftype
|
524
|
-
when :file
|
525
|
-
::File.open(@filepath, 'rb', &block)
|
526
|
-
when :symlink
|
527
|
-
linkpath = ::File.readlink(@filepath)
|
528
|
-
stringio = ::StringIO.new(linkpath)
|
529
|
-
yield(stringio) if block_given?
|
530
|
-
stringio
|
531
|
-
else
|
532
|
-
raise "unknown @file_type #{@ftype}"
|
533
|
-
end
|
534
|
-
else
|
535
|
-
zis = ::Zip::InputStream.new(@zipfile, local_header_offset)
|
536
|
-
zis.instance_variable_set(:@complete_entry, self)
|
537
|
-
zis.get_next_entry
|
538
|
-
if block_given?
|
539
|
-
begin
|
540
|
-
yield(zis)
|
541
|
-
ensure
|
542
|
-
zis.close
|
543
|
-
end
|
544
|
-
else
|
545
|
-
zis
|
546
|
-
end
|
547
|
-
end
|
548
|
-
end
|
549
|
-
|
550
|
-
def gather_fileinfo_from_srcpath(src_path) # :nodoc:
|
551
|
-
stat = file_stat(src_path)
|
552
|
-
@ftype = case stat.ftype
|
553
|
-
when 'file'
|
554
|
-
if name_is_directory?
|
555
|
-
raise ArgumentError,
|
556
|
-
"entry name '#{newEntry}' indicates directory entry, but " \
|
557
|
-
"'#{src_path}' is not a directory"
|
558
|
-
end
|
559
|
-
:file
|
560
|
-
when 'directory'
|
561
|
-
@name += '/' unless name_is_directory?
|
562
|
-
:directory
|
563
|
-
when 'link'
|
564
|
-
if name_is_directory?
|
565
|
-
raise ArgumentError,
|
566
|
-
"entry name '#{newEntry}' indicates directory entry, but " \
|
567
|
-
"'#{src_path}' is not a directory"
|
568
|
-
end
|
569
|
-
:symlink
|
570
|
-
else
|
571
|
-
raise "unknown file type: #{src_path.inspect} #{stat.inspect}"
|
572
|
-
end
|
573
|
-
|
574
|
-
@filepath = src_path
|
575
|
-
get_extra_attributes_from_path(@filepath)
|
576
|
-
end
|
577
|
-
|
578
|
-
def write_to_zip_output_stream(zip_output_stream) #:nodoc:all
|
579
|
-
if @ftype == :directory
|
580
|
-
zip_output_stream.put_next_entry(self, nil, nil, ::Zip::Entry::STORED)
|
581
|
-
elsif @filepath
|
582
|
-
zip_output_stream.put_next_entry(self, nil, nil, compression_method || ::Zip::Entry::DEFLATED)
|
583
|
-
get_input_stream { |is| ::Zip::IOExtras.copy_stream(zip_output_stream, is) }
|
584
|
-
else
|
585
|
-
zip_output_stream.copy_raw_entry(self)
|
586
|
-
end
|
587
|
-
end
|
588
|
-
|
589
|
-
def parent_as_string
|
590
|
-
entry_name = name.chomp('/')
|
591
|
-
slash_index = entry_name.rindex('/')
|
592
|
-
slash_index ? entry_name.slice(0, slash_index + 1) : nil
|
593
|
-
end
|
594
|
-
|
595
|
-
def get_raw_input_stream(&block)
|
596
|
-
if @zipfile.respond_to?(:seek) && @zipfile.respond_to?(:read)
|
597
|
-
yield @zipfile
|
598
|
-
else
|
599
|
-
::File.open(@zipfile, 'rb', &block)
|
600
|
-
end
|
601
|
-
end
|
602
|
-
|
603
|
-
def clean_up
|
604
|
-
# By default, do nothing
|
605
|
-
end
|
606
|
-
|
607
|
-
private
|
608
|
-
|
609
|
-
def set_time(binary_dos_date, binary_dos_time)
|
610
|
-
@time = ::Zip::DOSTime.parse_binary_dos_format(binary_dos_date, binary_dos_time)
|
611
|
-
rescue ArgumentError
|
612
|
-
warn 'WARNING: invalid date/time in zip entry.' if ::Zip.warn_invalid_date
|
613
|
-
end
|
614
|
-
|
615
|
-
def create_file(dest_path, _continue_on_exists_proc = proc { Zip.continue_on_exists_proc })
|
616
|
-
if ::File.exist?(dest_path) && !yield(self, dest_path)
|
617
|
-
raise ::Zip::DestinationFileExistsError,
|
618
|
-
"Destination '#{dest_path}' already exists"
|
619
|
-
end
|
620
|
-
::File.open(dest_path, 'wb') do |os|
|
621
|
-
get_input_stream do |is|
|
622
|
-
bytes_written = 0
|
623
|
-
warned = false
|
624
|
-
buf = +''
|
625
|
-
while (buf = is.sysread(::Zip::Decompressor::CHUNK_SIZE, buf))
|
626
|
-
os << buf
|
627
|
-
bytes_written += buf.bytesize
|
628
|
-
next unless bytes_written > size && !warned
|
629
|
-
|
630
|
-
message = "entry '#{name}' should be #{size}B, but is larger when inflated."
|
631
|
-
raise ::Zip::EntrySizeError, message if ::Zip.validate_entry_sizes
|
632
|
-
|
633
|
-
warn "WARNING: #{message}"
|
634
|
-
warned = true
|
635
|
-
end
|
636
|
-
end
|
637
|
-
end
|
638
|
-
|
639
|
-
set_extra_attributes_on_path(dest_path)
|
640
|
-
end
|
641
|
-
|
642
|
-
def create_directory(dest_path)
|
643
|
-
return if ::File.directory?(dest_path)
|
644
|
-
|
645
|
-
if ::File.exist?(dest_path)
|
646
|
-
if block_given? && yield(self, dest_path)
|
647
|
-
::FileUtils.rm_f dest_path
|
648
|
-
else
|
649
|
-
raise ::Zip::DestinationFileExistsError,
|
650
|
-
"Cannot create directory '#{dest_path}'. " \
|
651
|
-
'A file already exists with that name'
|
652
|
-
end
|
653
|
-
end
|
654
|
-
::FileUtils.mkdir_p(dest_path)
|
655
|
-
set_extra_attributes_on_path(dest_path)
|
656
|
-
end
|
657
|
-
|
658
|
-
# BUG: create_symlink() does not use &block
|
659
|
-
def create_symlink(dest_path)
|
660
|
-
# TODO: Symlinks pose security challenges. Symlink support temporarily
|
661
|
-
# removed in view of https://github.com/rubyzip/rubyzip/issues/369 .
|
662
|
-
warn "WARNING: skipped symlink '#{dest_path}'."
|
663
|
-
end
|
664
|
-
|
665
|
-
# apply missing data from the zip64 extra information field, if present
|
666
|
-
# (required when file sizes exceed 2**32, but can be used for all files)
|
667
|
-
def parse_zip64_extra(for_local_header) #:nodoc:all
|
668
|
-
return if @extra['Zip64'].nil?
|
669
|
-
|
670
|
-
if for_local_header
|
671
|
-
@size, @compressed_size = @extra['Zip64'].parse(@size, @compressed_size)
|
672
|
-
else
|
673
|
-
@size, @compressed_size, @local_header_offset = @extra['Zip64'].parse(@size, @compressed_size, @local_header_offset)
|
674
|
-
end
|
675
|
-
end
|
676
|
-
|
677
|
-
def data_descriptor_size
|
678
|
-
(@gp_flags & 0x0008) > 0 ? 16 : 0
|
679
|
-
end
|
680
|
-
|
681
|
-
# create a zip64 extra information field if we need one
|
682
|
-
def prep_zip64_extra(for_local_header) #:nodoc:all
|
683
|
-
return unless ::Zip.write_zip64_support
|
684
|
-
|
685
|
-
need_zip64 = @size >= 0xFFFFFFFF || @compressed_size >= 0xFFFFFFFF
|
686
|
-
need_zip64 ||= @local_header_offset >= 0xFFFFFFFF unless for_local_header
|
687
|
-
if need_zip64
|
688
|
-
@version_needed_to_extract = VERSION_NEEDED_TO_EXTRACT_ZIP64
|
689
|
-
@extra.delete('Zip64Placeholder')
|
690
|
-
zip64 = @extra.create('Zip64')
|
691
|
-
if for_local_header
|
692
|
-
# local header always includes size and compressed size
|
693
|
-
zip64.original_size = @size
|
694
|
-
zip64.compressed_size = @compressed_size
|
695
|
-
else
|
696
|
-
# central directory entry entries include whichever fields are necessary
|
697
|
-
zip64.original_size = @size if @size >= 0xFFFFFFFF
|
698
|
-
zip64.compressed_size = @compressed_size if @compressed_size >= 0xFFFFFFFF
|
699
|
-
zip64.relative_header_offset = @local_header_offset if @local_header_offset >= 0xFFFFFFFF
|
700
|
-
end
|
701
|
-
else
|
702
|
-
@extra.delete('Zip64')
|
703
|
-
|
704
|
-
# if this is a local header entry, create a placeholder
|
705
|
-
# so we have room to write a zip64 extra field afterward
|
706
|
-
# (we won't know if it's needed until the file data is written)
|
707
|
-
if for_local_header
|
708
|
-
@extra.create('Zip64Placeholder')
|
709
|
-
else
|
710
|
-
@extra.delete('Zip64Placeholder')
|
711
|
-
end
|
712
|
-
end
|
713
|
-
end
|
714
|
-
end
|
715
|
-
end
|
716
|
-
|
717
|
-
# Copyright (C) 2002, 2003 Thomas Sondergaard
|
718
|
-
# rubyzip is free software; you can redistribute it and/or
|
719
|
-
# modify it under the terms of the ruby license.
|