tar.c 43 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359
  1. /*
  2. +----------------------------------------------------------------------+
  3. | TAR archive support for Phar |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 2005-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt. |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Dmitry Stogov <dmitry@zend.com> |
  16. | Gregory Beaver <cellog@php.net> |
  17. +----------------------------------------------------------------------+
  18. */
  19. #include "phar_internal.h"
  20. static php_uint32 phar_tar_number(char *buf, int len) /* {{{ */
  21. {
  22. php_uint32 num = 0;
  23. int i = 0;
  24. while (i < len && buf[i] == ' ') {
  25. ++i;
  26. }
  27. while (i < len && buf[i] >= '0' && buf[i] <= '7') {
  28. num = num * 8 + (buf[i] - '0');
  29. ++i;
  30. }
  31. return num;
  32. }
  33. /* }}} */
  34. /* adapted from format_octal() in libarchive
  35. *
  36. * Copyright (c) 2003-2009 Tim Kientzle
  37. * All rights reserved.
  38. *
  39. * Redistribution and use in source and binary forms, with or without
  40. * modification, are permitted provided that the following conditions
  41. * are met:
  42. * 1. Redistributions of source code must retain the above copyright
  43. * notice, this list of conditions and the following disclaimer.
  44. * 2. Redistributions in binary form must reproduce the above copyright
  45. * notice, this list of conditions and the following disclaimer in the
  46. * documentation and/or other materials provided with the distribution.
  47. *
  48. * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
  49. * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  50. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  51. * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
  52. * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  53. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  54. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  55. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  56. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
  57. * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  58. */
  59. static int phar_tar_octal(char *buf, php_uint32 val, int len) /* {{{ */
  60. {
  61. char *p = buf;
  62. int s = len;
  63. p += len; /* Start at the end and work backwards. */
  64. while (s-- > 0) {
  65. *--p = (char)('0' + (val & 7));
  66. val >>= 3;
  67. }
  68. if (val == 0)
  69. return SUCCESS;
  70. /* If it overflowed, fill field with max value. */
  71. while (len-- > 0)
  72. *p++ = '7';
  73. return FAILURE;
  74. }
  75. /* }}} */
  76. static php_uint32 phar_tar_checksum(char *buf, int len) /* {{{ */
  77. {
  78. php_uint32 sum = 0;
  79. char *end = buf + len;
  80. while (buf != end) {
  81. sum += (unsigned char)*buf;
  82. ++buf;
  83. }
  84. return sum;
  85. }
  86. /* }}} */
  87. int phar_is_tar(char *buf, char *fname) /* {{{ */
  88. {
  89. tar_header *header = (tar_header *) buf;
  90. php_uint32 checksum = phar_tar_number(header->checksum, sizeof(header->checksum));
  91. php_uint32 ret;
  92. char save[sizeof(header->checksum)], *bname;
  93. /* assume that the first filename in a tar won't begin with <?php */
  94. if (!strncmp(buf, "<?php", sizeof("<?php")-1)) {
  95. return 0;
  96. }
  97. memcpy(save, header->checksum, sizeof(header->checksum));
  98. memset(header->checksum, ' ', sizeof(header->checksum));
  99. ret = (checksum == phar_tar_checksum(buf, 512));
  100. memcpy(header->checksum, save, sizeof(header->checksum));
  101. if ((bname = strrchr(fname, PHP_DIR_SEPARATOR))) {
  102. fname = bname;
  103. }
  104. if (!ret && (bname = strstr(fname, ".tar")) && (bname[4] == '\0' || bname[4] == '.')) {
  105. /* probably a corrupted tar - so we will pretend it is one */
  106. return 1;
  107. }
  108. return ret;
  109. }
  110. /* }}} */
  111. int phar_open_or_create_tar(char *fname, int fname_len, char *alias, int alias_len, int is_data, int options, phar_archive_data** pphar, char **error TSRMLS_DC) /* {{{ */
  112. {
  113. phar_archive_data *phar;
  114. int ret = phar_create_or_parse_filename(fname, fname_len, alias, alias_len, is_data, options, &phar, error TSRMLS_CC);
  115. if (FAILURE == ret) {
  116. return FAILURE;
  117. }
  118. if (pphar) {
  119. *pphar = phar;
  120. }
  121. phar->is_data = is_data;
  122. if (phar->is_tar) {
  123. return ret;
  124. }
  125. if (phar->is_brandnew) {
  126. phar->is_tar = 1;
  127. phar->is_zip = 0;
  128. phar->internal_file_start = 0;
  129. return SUCCESS;
  130. }
  131. /* we've reached here - the phar exists and is a regular phar */
  132. if (error) {
  133. spprintf(error, 4096, "phar tar error: \"%s\" already exists as a regular phar and must be deleted from disk prior to creating as a tar-based phar", fname);
  134. }
  135. return FAILURE;
  136. }
  137. /* }}} */
  138. static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp TSRMLS_DC) /* {{{ */
  139. {
  140. char *metadata;
  141. size_t save = php_stream_tell(fp), read;
  142. phar_entry_info *mentry;
  143. metadata = (char *) safe_emalloc(1, entry->uncompressed_filesize, 1);
  144. read = php_stream_read(fp, metadata, entry->uncompressed_filesize);
  145. if (read != entry->uncompressed_filesize) {
  146. efree(metadata);
  147. php_stream_seek(fp, save, SEEK_SET);
  148. return FAILURE;
  149. }
  150. if (phar_parse_metadata(&metadata, &entry->metadata, entry->uncompressed_filesize TSRMLS_CC) == FAILURE) {
  151. /* if not valid serialized data, it is a regular string */
  152. efree(metadata);
  153. php_stream_seek(fp, save, SEEK_SET);
  154. return FAILURE;
  155. }
  156. if (entry->filename_len == sizeof(".phar/.metadata.bin")-1 && !memcmp(entry->filename, ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1)) {
  157. entry->phar->metadata = entry->metadata;
  158. entry->metadata = NULL;
  159. } else if (entry->filename_len >= sizeof(".phar/.metadata/") + sizeof("/.metadata.bin") - 1 && SUCCESS == zend_hash_find(&(entry->phar->manifest), entry->filename + sizeof(".phar/.metadata/") - 1, entry->filename_len - (sizeof("/.metadata.bin") - 1 + sizeof(".phar/.metadata/") - 1), (void *)&mentry)) {
  160. /* transfer this metadata to the entry it refers */
  161. mentry->metadata = entry->metadata;
  162. entry->metadata = NULL;
  163. }
  164. efree(metadata);
  165. php_stream_seek(fp, save, SEEK_SET);
  166. return SUCCESS;
  167. }
  168. /* }}} */
  169. #if !HAVE_STRNLEN
  170. static size_t strnlen(const char *s, size_t maxlen) {
  171. char *r = (char *)memchr(s, '\0', maxlen);
  172. return r ? r-s : maxlen;
  173. }
  174. #endif
  175. int phar_parse_tarfile(php_stream* fp, char *fname, int fname_len, char *alias, int alias_len, phar_archive_data** pphar, int is_data, php_uint32 compression, char **error TSRMLS_DC) /* {{{ */
  176. {
  177. char buf[512], *actual_alias = NULL, *p;
  178. phar_entry_info entry = {0};
  179. size_t pos = 0, read, totalsize;
  180. tar_header *hdr;
  181. php_uint32 sum1, sum2, size, old;
  182. phar_archive_data *myphar, **actual;
  183. int last_was_longlink = 0;
  184. int linkname_len;
  185. if (error) {
  186. *error = NULL;
  187. }
  188. php_stream_seek(fp, 0, SEEK_END);
  189. totalsize = php_stream_tell(fp);
  190. php_stream_seek(fp, 0, SEEK_SET);
  191. read = php_stream_read(fp, buf, sizeof(buf));
  192. if (read != sizeof(buf)) {
  193. if (error) {
  194. spprintf(error, 4096, "phar error: \"%s\" is not a tar file or is truncated", fname);
  195. }
  196. php_stream_close(fp);
  197. return FAILURE;
  198. }
  199. hdr = (tar_header*)buf;
  200. old = (memcmp(hdr->magic, "ustar", sizeof("ustar")-1) != 0);
  201. myphar = (phar_archive_data *) pecalloc(1, sizeof(phar_archive_data), PHAR_G(persist));
  202. myphar->is_persistent = PHAR_G(persist);
  203. /* estimate number of entries, can't be certain with tar files */
  204. zend_hash_init(&myphar->manifest, 2 + (totalsize >> 12),
  205. zend_get_hash_value, destroy_phar_manifest_entry, (zend_bool)myphar->is_persistent);
  206. zend_hash_init(&myphar->mounted_dirs, 5,
  207. zend_get_hash_value, NULL, (zend_bool)myphar->is_persistent);
  208. zend_hash_init(&myphar->virtual_dirs, 4 + (totalsize >> 11),
  209. zend_get_hash_value, NULL, (zend_bool)myphar->is_persistent);
  210. myphar->is_tar = 1;
  211. /* remember whether this entire phar was compressed with gz/bzip2 */
  212. myphar->flags = compression;
  213. entry.is_tar = 1;
  214. entry.is_crc_checked = 1;
  215. entry.phar = myphar;
  216. pos += sizeof(buf);
  217. do {
  218. phar_entry_info *newentry;
  219. pos = php_stream_tell(fp);
  220. hdr = (tar_header*) buf;
  221. sum1 = phar_tar_number(hdr->checksum, sizeof(hdr->checksum));
  222. if (sum1 == 0 && phar_tar_checksum(buf, sizeof(buf)) == 0) {
  223. break;
  224. }
  225. memset(hdr->checksum, ' ', sizeof(hdr->checksum));
  226. sum2 = phar_tar_checksum(buf, old?sizeof(old_tar_header):sizeof(tar_header));
  227. size = entry.uncompressed_filesize = entry.compressed_filesize =
  228. phar_tar_number(hdr->size, sizeof(hdr->size));
  229. /* skip global/file headers (pax) */
  230. if (!old && (hdr->typeflag == TAR_GLOBAL_HDR || hdr->typeflag == TAR_FILE_HDR)) {
  231. size = (size+511)&~511;
  232. goto next;
  233. }
  234. if (((!old && hdr->prefix[0] == 0) || old) && strnlen(hdr->name, 100) == sizeof(".phar/signature.bin")-1 && !strncmp(hdr->name, ".phar/signature.bin", sizeof(".phar/signature.bin")-1)) {
  235. off_t curloc;
  236. if (size > 511) {
  237. if (error) {
  238. spprintf(error, 4096, "phar error: tar-based phar \"%s\" has signature that is larger than 511 bytes, cannot process", fname);
  239. }
  240. bail:
  241. php_stream_close(fp);
  242. phar_destroy_phar_data(myphar TSRMLS_CC);
  243. return FAILURE;
  244. }
  245. curloc = php_stream_tell(fp);
  246. read = php_stream_read(fp, buf, size);
  247. if (read != size || read <= 8) {
  248. if (error) {
  249. spprintf(error, 4096, "phar error: tar-based phar \"%s\" signature cannot be read", fname);
  250. }
  251. goto bail;
  252. }
  253. #ifdef WORDS_BIGENDIAN
  254. # define PHAR_GET_32(buffer) \
  255. (((((unsigned char*)(buffer))[3]) << 24) \
  256. | ((((unsigned char*)(buffer))[2]) << 16) \
  257. | ((((unsigned char*)(buffer))[1]) << 8) \
  258. | (((unsigned char*)(buffer))[0]))
  259. #else
  260. # define PHAR_GET_32(buffer) (php_uint32) *(buffer)
  261. #endif
  262. myphar->sig_flags = PHAR_GET_32(buf);
  263. if (FAILURE == phar_verify_signature(fp, php_stream_tell(fp) - size - 512, myphar->sig_flags, buf + 8, size - 8, fname, &myphar->signature, &myphar->sig_len, error TSRMLS_CC)) {
  264. if (error) {
  265. char *save = *error;
  266. spprintf(error, 4096, "phar error: tar-based phar \"%s\" signature cannot be verified: %s", fname, save);
  267. efree(save);
  268. }
  269. goto bail;
  270. }
  271. php_stream_seek(fp, curloc + 512, SEEK_SET);
  272. /* signature checked out, let's ensure this is the last file in the phar */
  273. if (((hdr->typeflag == '\0') || (hdr->typeflag == TAR_FILE)) && size > 0) {
  274. /* this is not good enough - seek succeeds even on truncated tars */
  275. php_stream_seek(fp, 512, SEEK_CUR);
  276. if ((uint)php_stream_tell(fp) > totalsize) {
  277. if (error) {
  278. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  279. }
  280. php_stream_close(fp);
  281. phar_destroy_phar_data(myphar TSRMLS_CC);
  282. return FAILURE;
  283. }
  284. }
  285. read = php_stream_read(fp, buf, sizeof(buf));
  286. if (read != sizeof(buf)) {
  287. if (error) {
  288. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  289. }
  290. php_stream_close(fp);
  291. phar_destroy_phar_data(myphar TSRMLS_CC);
  292. return FAILURE;
  293. }
  294. hdr = (tar_header*) buf;
  295. sum1 = phar_tar_number(hdr->checksum, sizeof(hdr->checksum));
  296. if (sum1 == 0 && phar_tar_checksum(buf, sizeof(buf)) == 0) {
  297. break;
  298. }
  299. if (error) {
  300. spprintf(error, 4096, "phar error: \"%s\" has entries after signature, invalid phar", fname);
  301. }
  302. goto bail;
  303. }
  304. if (!last_was_longlink && hdr->typeflag == 'L') {
  305. last_was_longlink = 1;
  306. /* support the ././@LongLink system for storing long filenames */
  307. entry.filename_len = entry.uncompressed_filesize;
  308. /* Check for overflow - bug 61065 */
  309. if (entry.filename_len == UINT_MAX || entry.filename_len == 0) {
  310. if (error) {
  311. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (invalid entry size)", fname);
  312. }
  313. php_stream_close(fp);
  314. phar_destroy_phar_data(myphar TSRMLS_CC);
  315. return FAILURE;
  316. }
  317. entry.filename = pemalloc(entry.filename_len+1, myphar->is_persistent);
  318. read = php_stream_read(fp, entry.filename, entry.filename_len);
  319. if (read != entry.filename_len) {
  320. efree(entry.filename);
  321. if (error) {
  322. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  323. }
  324. php_stream_close(fp);
  325. phar_destroy_phar_data(myphar TSRMLS_CC);
  326. return FAILURE;
  327. }
  328. entry.filename[entry.filename_len] = '\0';
  329. /* skip blank stuff */
  330. size = ((size+511)&~511) - size;
  331. /* this is not good enough - seek succeeds even on truncated tars */
  332. php_stream_seek(fp, size, SEEK_CUR);
  333. if ((uint)php_stream_tell(fp) > totalsize) {
  334. efree(entry.filename);
  335. if (error) {
  336. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  337. }
  338. php_stream_close(fp);
  339. phar_destroy_phar_data(myphar TSRMLS_CC);
  340. return FAILURE;
  341. }
  342. read = php_stream_read(fp, buf, sizeof(buf));
  343. if (read != sizeof(buf)) {
  344. efree(entry.filename);
  345. if (error) {
  346. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  347. }
  348. php_stream_close(fp);
  349. phar_destroy_phar_data(myphar TSRMLS_CC);
  350. return FAILURE;
  351. }
  352. continue;
  353. } else if (!last_was_longlink && !old && hdr->prefix[0] != 0) {
  354. char name[256];
  355. int i, j;
  356. for (i = 0; i < 155; i++) {
  357. name[i] = hdr->prefix[i];
  358. if (name[i] == '\0') {
  359. break;
  360. }
  361. }
  362. name[i++] = '/';
  363. for (j = 0; j < 100; j++) {
  364. name[i+j] = hdr->name[j];
  365. if (name[i+j] == '\0') {
  366. break;
  367. }
  368. }
  369. entry.filename_len = i+j;
  370. if (name[entry.filename_len - 1] == '/') {
  371. /* some tar programs store directories with trailing slash */
  372. entry.filename_len--;
  373. }
  374. entry.filename = pestrndup(name, entry.filename_len, myphar->is_persistent);
  375. } else if (!last_was_longlink) {
  376. int i;
  377. /* calculate strlen, which can be no longer than 100 */
  378. for (i = 0; i < 100; i++) {
  379. if (hdr->name[i] == '\0') {
  380. break;
  381. }
  382. }
  383. entry.filename_len = i;
  384. entry.filename = pestrndup(hdr->name, i, myphar->is_persistent);
  385. if (i > 0 && entry.filename[entry.filename_len - 1] == '/') {
  386. /* some tar programs store directories with trailing slash */
  387. entry.filename[entry.filename_len - 1] = '\0';
  388. entry.filename_len--;
  389. }
  390. }
  391. last_was_longlink = 0;
  392. phar_add_virtual_dirs(myphar, entry.filename, entry.filename_len TSRMLS_CC);
  393. if (sum1 != sum2) {
  394. if (error) {
  395. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (checksum mismatch of file \"%s\")", fname, entry.filename);
  396. }
  397. pefree(entry.filename, myphar->is_persistent);
  398. php_stream_close(fp);
  399. phar_destroy_phar_data(myphar TSRMLS_CC);
  400. return FAILURE;
  401. }
  402. entry.tar_type = ((old & (hdr->typeflag == '\0')) ? TAR_FILE : hdr->typeflag);
  403. entry.offset = entry.offset_abs = pos; /* header_offset unused in tar */
  404. entry.fp_type = PHAR_FP;
  405. entry.flags = phar_tar_number(hdr->mode, sizeof(hdr->mode)) & PHAR_ENT_PERM_MASK;
  406. entry.timestamp = phar_tar_number(hdr->mtime, sizeof(hdr->mtime));
  407. entry.is_persistent = myphar->is_persistent;
  408. #ifndef S_ISDIR
  409. #define S_ISDIR(mode) (((mode)&S_IFMT) == S_IFDIR)
  410. #endif
  411. if (old && entry.tar_type == TAR_FILE && S_ISDIR(entry.flags)) {
  412. entry.tar_type = TAR_DIR;
  413. }
  414. if (entry.tar_type == TAR_DIR) {
  415. entry.is_dir = 1;
  416. } else {
  417. entry.is_dir = 0;
  418. }
  419. entry.link = NULL;
  420. /* link field is null-terminated unless it has 100 non-null chars.
  421. * Thus we can not use strlen. */
  422. linkname_len = strnlen(hdr->linkname, 100);
  423. if (entry.tar_type == TAR_LINK) {
  424. if (!zend_hash_exists(&myphar->manifest, hdr->linkname, linkname_len)) {
  425. if (error) {
  426. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file - hard link to non-existent file \"%.*s\"", fname, linkname_len, hdr->linkname);
  427. }
  428. pefree(entry.filename, entry.is_persistent);
  429. php_stream_close(fp);
  430. phar_destroy_phar_data(myphar TSRMLS_CC);
  431. return FAILURE;
  432. }
  433. entry.link = estrndup(hdr->linkname, linkname_len);
  434. } else if (entry.tar_type == TAR_SYMLINK) {
  435. entry.link = estrndup(hdr->linkname, linkname_len);
  436. }
  437. phar_set_inode(&entry TSRMLS_CC);
  438. zend_hash_update(&myphar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), (void **) &newentry);
  439. ZEND_ASSERT(newentry != NULL);
  440. if (entry.is_persistent) {
  441. ++entry.manifest_pos;
  442. }
  443. if (entry.filename_len >= sizeof(".phar/.metadata")-1 && !memcmp(entry.filename, ".phar/.metadata", sizeof(".phar/.metadata")-1)) {
  444. if (FAILURE == phar_tar_process_metadata(newentry, fp TSRMLS_CC)) {
  445. if (error) {
  446. spprintf(error, 4096, "phar error: tar-based phar \"%s\" has invalid metadata in magic file \"%s\"", fname, entry.filename);
  447. }
  448. php_stream_close(fp);
  449. phar_destroy_phar_data(myphar TSRMLS_CC);
  450. return FAILURE;
  451. }
  452. }
  453. if (!actual_alias && entry.filename_len == sizeof(".phar/alias.txt")-1 && !strncmp(entry.filename, ".phar/alias.txt", sizeof(".phar/alias.txt")-1)) {
  454. /* found explicit alias */
  455. if (size > 511) {
  456. if (error) {
  457. spprintf(error, 4096, "phar error: tar-based phar \"%s\" has alias that is larger than 511 bytes, cannot process", fname);
  458. }
  459. php_stream_close(fp);
  460. phar_destroy_phar_data(myphar TSRMLS_CC);
  461. return FAILURE;
  462. }
  463. read = php_stream_read(fp, buf, size);
  464. if (read == size) {
  465. buf[size] = '\0';
  466. if (!phar_validate_alias(buf, size)) {
  467. if (size > 50) {
  468. buf[50] = '.';
  469. buf[51] = '.';
  470. buf[52] = '.';
  471. buf[53] = '\0';
  472. }
  473. if (error) {
  474. spprintf(error, 4096, "phar error: invalid alias \"%s\" in tar-based phar \"%s\"", buf, fname);
  475. }
  476. php_stream_close(fp);
  477. phar_destroy_phar_data(myphar TSRMLS_CC);
  478. return FAILURE;
  479. }
  480. actual_alias = pestrndup(buf, size, myphar->is_persistent);
  481. myphar->alias = actual_alias;
  482. myphar->alias_len = size;
  483. php_stream_seek(fp, pos, SEEK_SET);
  484. } else {
  485. if (error) {
  486. spprintf(error, 4096, "phar error: Unable to read alias from tar-based phar \"%s\"", fname);
  487. }
  488. php_stream_close(fp);
  489. phar_destroy_phar_data(myphar TSRMLS_CC);
  490. return FAILURE;
  491. }
  492. }
  493. size = (size+511)&~511;
  494. if (((hdr->typeflag == '\0') || (hdr->typeflag == TAR_FILE)) && size > 0) {
  495. next:
  496. /* this is not good enough - seek succeeds even on truncated tars */
  497. php_stream_seek(fp, size, SEEK_CUR);
  498. if ((uint)php_stream_tell(fp) > totalsize) {
  499. if (error) {
  500. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  501. }
  502. php_stream_close(fp);
  503. phar_destroy_phar_data(myphar TSRMLS_CC);
  504. return FAILURE;
  505. }
  506. }
  507. read = php_stream_read(fp, buf, sizeof(buf));
  508. if (read != sizeof(buf)) {
  509. if (error) {
  510. spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
  511. }
  512. php_stream_close(fp);
  513. phar_destroy_phar_data(myphar TSRMLS_CC);
  514. return FAILURE;
  515. }
  516. } while (read != 0);
  517. if (zend_hash_exists(&(myphar->manifest), ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
  518. myphar->is_data = 0;
  519. } else {
  520. myphar->is_data = 1;
  521. }
  522. /* ensure signature set */
  523. if (!myphar->is_data && PHAR_G(require_hash) && !myphar->signature) {
  524. php_stream_close(fp);
  525. phar_destroy_phar_data(myphar TSRMLS_CC);
  526. if (error) {
  527. spprintf(error, 0, "tar-based phar \"%s\" does not have a signature", fname);
  528. }
  529. return FAILURE;
  530. }
  531. myphar->fname = pestrndup(fname, fname_len, myphar->is_persistent);
  532. #ifdef PHP_WIN32
  533. phar_unixify_path_separators(myphar->fname, fname_len);
  534. #endif
  535. myphar->fname_len = fname_len;
  536. myphar->fp = fp;
  537. p = strrchr(myphar->fname, '/');
  538. if (p) {
  539. myphar->ext = memchr(p, '.', (myphar->fname + fname_len) - p);
  540. if (myphar->ext == p) {
  541. myphar->ext = memchr(p + 1, '.', (myphar->fname + fname_len) - p - 1);
  542. }
  543. if (myphar->ext) {
  544. myphar->ext_len = (myphar->fname + fname_len) - myphar->ext;
  545. }
  546. }
  547. phar_request_initialize(TSRMLS_C);
  548. if (SUCCESS != zend_hash_add(&(PHAR_GLOBALS->phar_fname_map), myphar->fname, fname_len, (void*)&myphar, sizeof(phar_archive_data*), (void **)&actual)) {
  549. if (error) {
  550. spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\" to phar registry", fname);
  551. }
  552. php_stream_close(fp);
  553. phar_destroy_phar_data(myphar TSRMLS_CC);
  554. return FAILURE;
  555. }
  556. myphar = *actual;
  557. if (actual_alias) {
  558. phar_archive_data **fd_ptr;
  559. myphar->is_temporary_alias = 0;
  560. if (SUCCESS == zend_hash_find(&(PHAR_GLOBALS->phar_alias_map), actual_alias, myphar->alias_len, (void **)&fd_ptr)) {
  561. if (SUCCESS != phar_free_alias(*fd_ptr, actual_alias, myphar->alias_len TSRMLS_CC)) {
  562. if (error) {
  563. spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\", alias is already in use", fname);
  564. }
  565. zend_hash_del(&(PHAR_GLOBALS->phar_fname_map), myphar->fname, fname_len);
  566. return FAILURE;
  567. }
  568. }
  569. zend_hash_add(&(PHAR_GLOBALS->phar_alias_map), actual_alias, myphar->alias_len, (void*)&myphar, sizeof(phar_archive_data*), NULL);
  570. } else {
  571. phar_archive_data **fd_ptr;
  572. if (alias_len) {
  573. if (SUCCESS == zend_hash_find(&(PHAR_GLOBALS->phar_alias_map), alias, alias_len, (void **)&fd_ptr)) {
  574. if (SUCCESS != phar_free_alias(*fd_ptr, alias, alias_len TSRMLS_CC)) {
  575. if (error) {
  576. spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\", alias is already in use", fname);
  577. }
  578. zend_hash_del(&(PHAR_GLOBALS->phar_fname_map), myphar->fname, fname_len);
  579. return FAILURE;
  580. }
  581. }
  582. zend_hash_add(&(PHAR_GLOBALS->phar_alias_map), alias, alias_len, (void*)&myphar, sizeof(phar_archive_data*), NULL);
  583. myphar->alias = pestrndup(alias, alias_len, myphar->is_persistent);
  584. myphar->alias_len = alias_len;
  585. } else {
  586. myphar->alias = pestrndup(myphar->fname, fname_len, myphar->is_persistent);
  587. myphar->alias_len = fname_len;
  588. }
  589. myphar->is_temporary_alias = 1;
  590. }
  591. if (pphar) {
  592. *pphar = myphar;
  593. }
  594. return SUCCESS;
  595. }
  596. /* }}} */
  597. struct _phar_pass_tar_info {
  598. php_stream *old;
  599. php_stream *new;
  600. int free_fp;
  601. int free_ufp;
  602. char **error;
  603. };
  604. static int phar_tar_writeheaders(void *pDest, void *argument TSRMLS_DC) /* {{{ */
  605. {
  606. tar_header header;
  607. size_t pos;
  608. phar_entry_info *entry = (phar_entry_info *) pDest;
  609. struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument;
  610. char padding[512];
  611. if (entry->is_mounted) {
  612. return ZEND_HASH_APPLY_KEEP;
  613. }
  614. if (entry->is_deleted) {
  615. if (entry->fp_refcount <= 0) {
  616. return ZEND_HASH_APPLY_REMOVE;
  617. } else {
  618. /* we can't delete this in-memory until it is closed */
  619. return ZEND_HASH_APPLY_KEEP;
  620. }
  621. }
  622. phar_add_virtual_dirs(entry->phar, entry->filename, entry->filename_len TSRMLS_CC);
  623. memset((char *) &header, 0, sizeof(header));
  624. if (entry->filename_len > 100) {
  625. char *boundary;
  626. if (entry->filename_len > 256) {
  627. if (fp->error) {
  628. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too long for tar file format", entry->phar->fname, entry->filename);
  629. }
  630. return ZEND_HASH_APPLY_STOP;
  631. }
  632. boundary = entry->filename + entry->filename_len - 101;
  633. while (*boundary && *boundary != '/') {
  634. ++boundary;
  635. }
  636. if (!*boundary || ((boundary - entry->filename) > 155)) {
  637. if (fp->error) {
  638. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too long for tar file format", entry->phar->fname, entry->filename);
  639. }
  640. return ZEND_HASH_APPLY_STOP;
  641. }
  642. memcpy(header.prefix, entry->filename, boundary - entry->filename);
  643. memcpy(header.name, boundary + 1, entry->filename_len - (boundary + 1 - entry->filename));
  644. } else {
  645. memcpy(header.name, entry->filename, entry->filename_len);
  646. }
  647. phar_tar_octal(header.mode, entry->flags & PHAR_ENT_PERM_MASK, sizeof(header.mode)-1);
  648. if (FAILURE == phar_tar_octal(header.size, entry->uncompressed_filesize, sizeof(header.size)-1)) {
  649. if (fp->error) {
  650. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
  651. }
  652. return ZEND_HASH_APPLY_STOP;
  653. }
  654. if (FAILURE == phar_tar_octal(header.mtime, entry->timestamp, sizeof(header.mtime)-1)) {
  655. if (fp->error) {
  656. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, file modification time of file \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
  657. }
  658. return ZEND_HASH_APPLY_STOP;
  659. }
  660. /* calc checksum */
  661. header.typeflag = entry->tar_type;
  662. if (entry->link) {
  663. strncpy(header.linkname, entry->link, strlen(entry->link));
  664. }
  665. strncpy(header.magic, "ustar", sizeof("ustar")-1);
  666. strncpy(header.version, "00", sizeof("00")-1);
  667. strncpy(header.checksum, " ", sizeof(" ")-1);
  668. entry->crc32 = phar_tar_checksum((char *)&header, sizeof(header));
  669. if (FAILURE == phar_tar_octal(header.checksum, entry->crc32, sizeof(header.checksum)-1)) {
  670. if (fp->error) {
  671. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, checksum of file \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
  672. }
  673. return ZEND_HASH_APPLY_STOP;
  674. }
  675. /* write header */
  676. entry->header_offset = php_stream_tell(fp->new);
  677. if (sizeof(header) != php_stream_write(fp->new, (char *) &header, sizeof(header))) {
  678. if (fp->error) {
  679. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, header for file \"%s\" could not be written", entry->phar->fname, entry->filename);
  680. }
  681. return ZEND_HASH_APPLY_STOP;
  682. }
  683. pos = php_stream_tell(fp->new); /* save start of file within tar */
  684. /* write contents */
  685. if (entry->uncompressed_filesize) {
  686. if (FAILURE == phar_open_entry_fp(entry, fp->error, 0 TSRMLS_CC)) {
  687. return ZEND_HASH_APPLY_STOP;
  688. }
  689. if (-1 == phar_seek_efp(entry, 0, SEEK_SET, 0, 0 TSRMLS_CC)) {
  690. if (fp->error) {
  691. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, contents of file \"%s\" could not be written, seek failed", entry->phar->fname, entry->filename);
  692. }
  693. return ZEND_HASH_APPLY_STOP;
  694. }
  695. if (SUCCESS != php_stream_copy_to_stream_ex(phar_get_efp(entry, 0 TSRMLS_CC), fp->new, entry->uncompressed_filesize, NULL)) {
  696. if (fp->error) {
  697. spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, contents of file \"%s\" could not be written", entry->phar->fname, entry->filename);
  698. }
  699. return ZEND_HASH_APPLY_STOP;
  700. }
  701. memset(padding, 0, 512);
  702. php_stream_write(fp->new, padding, ((entry->uncompressed_filesize +511)&~511) - entry->uncompressed_filesize);
  703. }
  704. if (!entry->is_modified && entry->fp_refcount) {
  705. /* open file pointers refer to this fp, do not free the stream */
  706. switch (entry->fp_type) {
  707. case PHAR_FP:
  708. fp->free_fp = 0;
  709. break;
  710. case PHAR_UFP:
  711. fp->free_ufp = 0;
  712. default:
  713. break;
  714. }
  715. }
  716. entry->is_modified = 0;
  717. if (entry->fp_type == PHAR_MOD && entry->fp != entry->phar->fp && entry->fp != entry->phar->ufp) {
  718. if (!entry->fp_refcount) {
  719. php_stream_close(entry->fp);
  720. }
  721. entry->fp = NULL;
  722. }
  723. entry->fp_type = PHAR_FP;
  724. /* note new location within tar */
  725. entry->offset = entry->offset_abs = pos;
  726. return ZEND_HASH_APPLY_KEEP;
  727. }
  728. /* }}} */
  729. int phar_tar_setmetadata(zval *metadata, phar_entry_info *entry, char **error TSRMLS_DC) /* {{{ */
  730. {
  731. php_serialize_data_t metadata_hash;
  732. if (entry->metadata_str.c) {
  733. smart_str_free(&entry->metadata_str);
  734. }
  735. entry->metadata_str.c = 0;
  736. entry->metadata_str.len = 0;
  737. PHP_VAR_SERIALIZE_INIT(metadata_hash);
  738. php_var_serialize(&entry->metadata_str, &metadata, &metadata_hash TSRMLS_CC);
  739. PHP_VAR_SERIALIZE_DESTROY(metadata_hash);
  740. entry->uncompressed_filesize = entry->compressed_filesize = entry->metadata_str.len;
  741. if (entry->fp && entry->fp_type == PHAR_MOD) {
  742. php_stream_close(entry->fp);
  743. }
  744. entry->fp_type = PHAR_MOD;
  745. entry->is_modified = 1;
  746. entry->fp = php_stream_fopen_tmpfile();
  747. entry->offset = entry->offset_abs = 0;
  748. if (entry->fp == NULL) {
  749. spprintf(error, 0, "phar error: unable to create temporary file");
  750. return -1;
  751. }
  752. if (entry->metadata_str.len != php_stream_write(entry->fp, entry->metadata_str.c, entry->metadata_str.len)) {
  753. spprintf(error, 0, "phar tar error: unable to write metadata to magic metadata file \"%s\"", entry->filename);
  754. zend_hash_del(&(entry->phar->manifest), entry->filename, entry->filename_len);
  755. return ZEND_HASH_APPLY_STOP;
  756. }
  757. return ZEND_HASH_APPLY_KEEP;
  758. }
  759. /* }}} */
  760. static int phar_tar_setupmetadata(void *pDest, void *argument TSRMLS_DC) /* {{{ */
  761. {
  762. int lookfor_len;
  763. struct _phar_pass_tar_info *i = (struct _phar_pass_tar_info *)argument;
  764. char *lookfor, **error = i->error;
  765. phar_entry_info *entry = (phar_entry_info *)pDest, *metadata, newentry = {0};
  766. if (entry->filename_len >= sizeof(".phar/.metadata") && !memcmp(entry->filename, ".phar/.metadata", sizeof(".phar/.metadata")-1)) {
  767. if (entry->filename_len == sizeof(".phar/.metadata.bin")-1 && !memcmp(entry->filename, ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1)) {
  768. if (entry->phar->metadata == NULL) {
  769. return ZEND_HASH_APPLY_REMOVE;
  770. }
  771. return phar_tar_setmetadata(entry->phar->metadata, entry, error TSRMLS_CC);
  772. }
  773. /* search for the file this metadata entry references */
  774. if (entry->filename_len >= sizeof(".phar/.metadata/") + sizeof("/.metadata.bin") - 1 && !zend_hash_exists(&(entry->phar->manifest), entry->filename + sizeof(".phar/.metadata/") - 1, entry->filename_len - (sizeof("/.metadata.bin") - 1 + sizeof(".phar/.metadata/") - 1))) {
  775. /* this is orphaned metadata, erase it */
  776. return ZEND_HASH_APPLY_REMOVE;
  777. }
  778. /* we can keep this entry, the file that refers to it exists */
  779. return ZEND_HASH_APPLY_KEEP;
  780. }
  781. if (!entry->is_modified) {
  782. return ZEND_HASH_APPLY_KEEP;
  783. }
  784. /* now we are dealing with regular files, so look for metadata */
  785. lookfor_len = spprintf(&lookfor, 0, ".phar/.metadata/%s/.metadata.bin", entry->filename);
  786. if (!entry->metadata) {
  787. zend_hash_del(&(entry->phar->manifest), lookfor, lookfor_len);
  788. efree(lookfor);
  789. return ZEND_HASH_APPLY_KEEP;
  790. }
  791. if (SUCCESS == zend_hash_find(&(entry->phar->manifest), lookfor, lookfor_len, (void **)&metadata)) {
  792. int ret;
  793. ret = phar_tar_setmetadata(entry->metadata, metadata, error TSRMLS_CC);
  794. efree(lookfor);
  795. return ret;
  796. }
  797. newentry.filename = lookfor;
  798. newentry.filename_len = lookfor_len;
  799. newentry.phar = entry->phar;
  800. newentry.tar_type = TAR_FILE;
  801. newentry.is_tar = 1;
  802. if (SUCCESS != zend_hash_add(&(entry->phar->manifest), lookfor, lookfor_len, (void *)&newentry, sizeof(phar_entry_info), (void **)&metadata)) {
  803. efree(lookfor);
  804. spprintf(error, 0, "phar tar error: unable to add magic metadata file to manifest for file \"%s\"", entry->filename);
  805. return ZEND_HASH_APPLY_STOP;
  806. }
  807. return phar_tar_setmetadata(entry->metadata, metadata, error TSRMLS_CC);
  808. }
  809. /* }}} */
  810. int phar_tar_flush(phar_archive_data *phar, char *user_stub, long len, int defaultstub, char **error TSRMLS_DC) /* {{{ */
  811. {
  812. phar_entry_info entry = {0};
  813. static const char newstub[] = "<?php // tar-based phar archive stub file\n__HALT_COMPILER();";
  814. php_stream *oldfile, *newfile, *stubfile;
  815. int closeoldfile, free_user_stub, signature_length;
  816. struct _phar_pass_tar_info pass;
  817. char *buf, *signature, *tmp, sigbuf[8];
  818. char halt_stub[] = "__HALT_COMPILER();";
  819. entry.flags = PHAR_ENT_PERM_DEF_FILE;
  820. entry.timestamp = time(NULL);
  821. entry.is_modified = 1;
  822. entry.is_crc_checked = 1;
  823. entry.is_tar = 1;
  824. entry.tar_type = '0';
  825. entry.phar = phar;
  826. entry.fp_type = PHAR_MOD;
  827. if (phar->is_persistent) {
  828. if (error) {
  829. spprintf(error, 0, "internal error: attempt to flush cached tar-based phar \"%s\"", phar->fname);
  830. }
  831. return EOF;
  832. }
  833. if (phar->is_data) {
  834. goto nostub;
  835. }
  836. /* set alias */
  837. if (!phar->is_temporary_alias && phar->alias_len) {
  838. entry.filename = estrndup(".phar/alias.txt", sizeof(".phar/alias.txt")-1);
  839. entry.filename_len = sizeof(".phar/alias.txt")-1;
  840. entry.fp = php_stream_fopen_tmpfile();
  841. if (entry.fp == NULL) {
  842. spprintf(error, 0, "phar error: unable to create temporary file");
  843. return -1;
  844. }
  845. if (phar->alias_len != (int)php_stream_write(entry.fp, phar->alias, phar->alias_len)) {
  846. if (error) {
  847. spprintf(error, 0, "unable to set alias in tar-based phar \"%s\"", phar->fname);
  848. }
  849. return EOF;
  850. }
  851. entry.uncompressed_filesize = phar->alias_len;
  852. if (SUCCESS != zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
  853. if (error) {
  854. spprintf(error, 0, "unable to set alias in tar-based phar \"%s\"", phar->fname);
  855. }
  856. return EOF;
  857. }
  858. } else {
  859. zend_hash_del(&phar->manifest, ".phar/alias.txt", sizeof(".phar/alias.txt")-1);
  860. }
  861. /* set stub */
  862. if (user_stub && !defaultstub) {
  863. char *pos;
  864. if (len < 0) {
  865. /* resource passed in */
  866. if (!(php_stream_from_zval_no_verify(stubfile, (zval **)user_stub))) {
  867. if (error) {
  868. spprintf(error, 0, "unable to access resource to copy stub to new tar-based phar \"%s\"", phar->fname);
  869. }
  870. return EOF;
  871. }
  872. if (len == -1) {
  873. len = PHP_STREAM_COPY_ALL;
  874. } else {
  875. len = -len;
  876. }
  877. user_stub = 0;
  878. if (!(len = php_stream_copy_to_mem(stubfile, &user_stub, len, 0)) || !user_stub) {
  879. if (error) {
  880. spprintf(error, 0, "unable to read resource to copy stub to new tar-based phar \"%s\"", phar->fname);
  881. }
  882. return EOF;
  883. }
  884. free_user_stub = 1;
  885. } else {
  886. free_user_stub = 0;
  887. }
  888. tmp = estrndup(user_stub, len);
  889. if ((pos = php_stristr(tmp, halt_stub, len, sizeof(halt_stub) - 1)) == NULL) {
  890. efree(tmp);
  891. if (error) {
  892. spprintf(error, 0, "illegal stub for tar-based phar \"%s\"", phar->fname);
  893. }
  894. if (free_user_stub) {
  895. efree(user_stub);
  896. }
  897. return EOF;
  898. }
  899. pos = user_stub + (pos - tmp);
  900. efree(tmp);
  901. len = pos - user_stub + 18;
  902. entry.fp = php_stream_fopen_tmpfile();
  903. if (entry.fp == NULL) {
  904. spprintf(error, 0, "phar error: unable to create temporary file");
  905. return EOF;
  906. }
  907. entry.uncompressed_filesize = len + 5;
  908. if ((size_t)len != php_stream_write(entry.fp, user_stub, len)
  909. || 5 != php_stream_write(entry.fp, " ?>\r\n", 5)) {
  910. if (error) {
  911. spprintf(error, 0, "unable to create stub from string in new tar-based phar \"%s\"", phar->fname);
  912. }
  913. if (free_user_stub) {
  914. efree(user_stub);
  915. }
  916. php_stream_close(entry.fp);
  917. return EOF;
  918. }
  919. entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
  920. entry.filename_len = sizeof(".phar/stub.php")-1;
  921. zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL);
  922. if (free_user_stub) {
  923. efree(user_stub);
  924. }
  925. } else {
  926. /* Either this is a brand new phar (add the stub), or the default stub is required (overwrite the stub) */
  927. entry.fp = php_stream_fopen_tmpfile();
  928. if (entry.fp == NULL) {
  929. spprintf(error, 0, "phar error: unable to create temporary file");
  930. return EOF;
  931. }
  932. if (sizeof(newstub)-1 != php_stream_write(entry.fp, newstub, sizeof(newstub)-1)) {
  933. php_stream_close(entry.fp);
  934. if (error) {
  935. spprintf(error, 0, "unable to %s stub in%star-based phar \"%s\", failed", user_stub ? "overwrite" : "create", user_stub ? " " : " new ", phar->fname);
  936. }
  937. return EOF;
  938. }
  939. entry.uncompressed_filesize = entry.compressed_filesize = sizeof(newstub) - 1;
  940. entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
  941. entry.filename_len = sizeof(".phar/stub.php")-1;
  942. if (!defaultstub) {
  943. if (!zend_hash_exists(&phar->manifest, ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
  944. if (SUCCESS != zend_hash_add(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
  945. php_stream_close(entry.fp);
  946. efree(entry.filename);
  947. if (error) {
  948. spprintf(error, 0, "unable to create stub in tar-based phar \"%s\"", phar->fname);
  949. }
  950. return EOF;
  951. }
  952. } else {
  953. php_stream_close(entry.fp);
  954. efree(entry.filename);
  955. }
  956. } else {
  957. if (SUCCESS != zend_hash_update(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info), NULL)) {
  958. php_stream_close(entry.fp);
  959. efree(entry.filename);
  960. if (error) {
  961. spprintf(error, 0, "unable to overwrite stub in tar-based phar \"%s\"", phar->fname);
  962. }
  963. return EOF;
  964. }
  965. }
  966. }
  967. nostub:
  968. if (phar->fp && !phar->is_brandnew) {
  969. oldfile = phar->fp;
  970. closeoldfile = 0;
  971. php_stream_rewind(oldfile);
  972. } else {
  973. oldfile = php_stream_open_wrapper(phar->fname, "rb", 0, NULL);
  974. closeoldfile = oldfile != NULL;
  975. }
  976. newfile = php_stream_fopen_tmpfile();
  977. if (!newfile) {
  978. if (error) {
  979. spprintf(error, 0, "unable to create temporary file");
  980. }
  981. if (closeoldfile) {
  982. php_stream_close(oldfile);
  983. }
  984. return EOF;
  985. }
  986. pass.old = oldfile;
  987. pass.new = newfile;
  988. pass.error = error;
  989. pass.free_fp = 1;
  990. pass.free_ufp = 1;
  991. if (phar->metadata) {
  992. phar_entry_info *mentry;
  993. if (SUCCESS == zend_hash_find(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1, (void **)&mentry)) {
  994. if (ZEND_HASH_APPLY_KEEP != phar_tar_setmetadata(phar->metadata, mentry, error TSRMLS_CC)) {
  995. if (closeoldfile) {
  996. php_stream_close(oldfile);
  997. }
  998. return EOF;
  999. }
  1000. } else {
  1001. phar_entry_info newentry = {0};
  1002. newentry.filename = estrndup(".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1);
  1003. newentry.filename_len = sizeof(".phar/.metadata.bin")-1;
  1004. newentry.phar = phar;
  1005. newentry.tar_type = TAR_FILE;
  1006. newentry.is_tar = 1;
  1007. if (SUCCESS != zend_hash_add(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1, (void *)&newentry, sizeof(phar_entry_info), (void **)&mentry)) {
  1008. spprintf(error, 0, "phar tar error: unable to add magic metadata file to manifest for phar archive \"%s\"", phar->fname);
  1009. if (closeoldfile) {
  1010. php_stream_close(oldfile);
  1011. }
  1012. return EOF;
  1013. }
  1014. if (ZEND_HASH_APPLY_KEEP != phar_tar_setmetadata(phar->metadata, mentry, error TSRMLS_CC)) {
  1015. zend_hash_del(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1);
  1016. if (closeoldfile) {
  1017. php_stream_close(oldfile);
  1018. }
  1019. return EOF;
  1020. }
  1021. }
  1022. }
  1023. zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_setupmetadata, (void *) &pass TSRMLS_CC);
  1024. if (error && *error) {
  1025. if (closeoldfile) {
  1026. php_stream_close(oldfile);
  1027. }
  1028. /* on error in the hash iterator above, error is set */
  1029. php_stream_close(newfile);
  1030. return EOF;
  1031. }
  1032. zend_hash_apply_with_argument(&phar->manifest, (apply_func_arg_t) phar_tar_writeheaders, (void *) &pass TSRMLS_CC);
  1033. /* add signature for executable tars or tars explicitly set with setSignatureAlgorithm */
  1034. if (!phar->is_data || phar->sig_flags) {
  1035. if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, error TSRMLS_CC)) {
  1036. if (error) {
  1037. char *save = *error;
  1038. spprintf(error, 0, "phar error: unable to write signature to tar-based phar: %s", save);
  1039. efree(save);
  1040. }
  1041. if (closeoldfile) {
  1042. php_stream_close(oldfile);
  1043. }
  1044. php_stream_close(newfile);
  1045. return EOF;
  1046. }
  1047. entry.filename = ".phar/signature.bin";
  1048. entry.filename_len = sizeof(".phar/signature.bin")-1;
  1049. entry.fp = php_stream_fopen_tmpfile();
  1050. if (entry.fp == NULL) {
  1051. spprintf(error, 0, "phar error: unable to create temporary file");
  1052. return EOF;
  1053. }
  1054. #ifdef WORDS_BIGENDIAN
  1055. # define PHAR_SET_32(var, buffer) \
  1056. *(php_uint32 *)(var) = (((((unsigned char*)&(buffer))[3]) << 24) \
  1057. | ((((unsigned char*)&(buffer))[2]) << 16) \
  1058. | ((((unsigned char*)&(buffer))[1]) << 8) \
  1059. | (((unsigned char*)&(buffer))[0]))
  1060. #else
  1061. # define PHAR_SET_32(var, buffer) *(php_uint32 *)(var) = (php_uint32) (buffer)
  1062. #endif
  1063. PHAR_SET_32(sigbuf, phar->sig_flags);
  1064. PHAR_SET_32(sigbuf + 4, signature_length);
  1065. if (8 != (int)php_stream_write(entry.fp, sigbuf, 8) || signature_length != (int)php_stream_write(entry.fp, signature, signature_length)) {
  1066. efree(signature);
  1067. if (error) {
  1068. spprintf(error, 0, "phar error: unable to write signature to tar-based phar %s", phar->fname);
  1069. }
  1070. if (closeoldfile) {
  1071. php_stream_close(oldfile);
  1072. }
  1073. php_stream_close(newfile);
  1074. return EOF;
  1075. }
  1076. efree(signature);
  1077. entry.uncompressed_filesize = entry.compressed_filesize = signature_length + 8;
  1078. /* throw out return value and write the signature */
  1079. entry.filename_len = phar_tar_writeheaders((void *)&entry, (void *)&pass TSRMLS_CC);
  1080. if (error && *error) {
  1081. if (closeoldfile) {
  1082. php_stream_close(oldfile);
  1083. }
  1084. /* error is set by writeheaders */
  1085. php_stream_close(newfile);
  1086. return EOF;
  1087. }
  1088. } /* signature */
  1089. /* add final zero blocks */
  1090. buf = (char *) ecalloc(1024, 1);
  1091. php_stream_write(newfile, buf, 1024);
  1092. efree(buf);
  1093. if (closeoldfile) {
  1094. php_stream_close(oldfile);
  1095. }
  1096. /* on error in the hash iterator above, error is set */
  1097. if (error && *error) {
  1098. php_stream_close(newfile);
  1099. return EOF;
  1100. }
  1101. if (phar->fp && pass.free_fp) {
  1102. php_stream_close(phar->fp);
  1103. }
  1104. if (phar->ufp) {
  1105. if (pass.free_ufp) {
  1106. php_stream_close(phar->ufp);
  1107. }
  1108. phar->ufp = NULL;
  1109. }
  1110. phar->is_brandnew = 0;
  1111. php_stream_rewind(newfile);
  1112. if (phar->donotflush) {
  1113. /* deferred flush */
  1114. phar->fp = newfile;
  1115. } else {
  1116. phar->fp = php_stream_open_wrapper(phar->fname, "w+b", IGNORE_URL|STREAM_MUST_SEEK|REPORT_ERRORS, NULL);
  1117. if (!phar->fp) {
  1118. phar->fp = newfile;
  1119. if (error) {
  1120. spprintf(error, 0, "unable to open new phar \"%s\" for writing", phar->fname);
  1121. }
  1122. return EOF;
  1123. }
  1124. if (phar->flags & PHAR_FILE_COMPRESSED_GZ) {
  1125. php_stream_filter *filter;
  1126. /* to properly compress, we have to tell zlib to add a zlib header */
  1127. zval filterparams;
  1128. array_init(&filterparams);
  1129. /* this is defined in zlib's zconf.h */
  1130. #ifndef MAX_WBITS
  1131. #define MAX_WBITS 15
  1132. #endif
  1133. add_assoc_long(&filterparams, "window", MAX_WBITS + 16);
  1134. filter = php_stream_filter_create("zlib.deflate", &filterparams, php_stream_is_persistent(phar->fp) TSRMLS_CC);
  1135. zval_dtor(&filterparams);
  1136. if (!filter) {
  1137. /* copy contents uncompressed rather than lose them */
  1138. php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
  1139. php_stream_close(newfile);
  1140. if (error) {
  1141. spprintf(error, 4096, "unable to compress all contents of phar \"%s\" using zlib, PHP versions older than 5.2.6 have a buggy zlib", phar->fname);
  1142. }
  1143. return EOF;
  1144. }
  1145. php_stream_filter_append(&phar->fp->writefilters, filter);
  1146. php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
  1147. php_stream_filter_flush(filter, 1);
  1148. php_stream_filter_remove(filter, 1 TSRMLS_CC);
  1149. php_stream_close(phar->fp);
  1150. /* use the temp stream as our base */
  1151. phar->fp = newfile;
  1152. } else if (phar->flags & PHAR_FILE_COMPRESSED_BZ2) {
  1153. php_stream_filter *filter;
  1154. filter = php_stream_filter_create("bzip2.compress", NULL, php_stream_is_persistent(phar->fp) TSRMLS_CC);
  1155. php_stream_filter_append(&phar->fp->writefilters, filter);
  1156. php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
  1157. php_stream_filter_flush(filter, 1);
  1158. php_stream_filter_remove(filter, 1 TSRMLS_CC);
  1159. php_stream_close(phar->fp);
  1160. /* use the temp stream as our base */
  1161. phar->fp = newfile;
  1162. } else {
  1163. php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
  1164. /* we could also reopen the file in "rb" mode but there is no need for that */
  1165. php_stream_close(newfile);
  1166. }
  1167. }
  1168. return EOF;
  1169. }
  1170. /* }}} */
  1171. /*
  1172. * Local variables:
  1173. * tab-width: 4
  1174. * c-basic-offset: 4
  1175. * End:
  1176. * vim600: noet sw=4 ts=4 fdm=marker
  1177. * vim<600: noet sw=4 ts=4
  1178. */