busybox/libbb/untar.c

234 lines
7.3 KiB
C
Raw Normal View History

/*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Library General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*
* NOTE: This is used by deb_extract to avoid calling the whole tar applet.
* Its functionality should be merged with tar to avoid duplication
*/
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "libbb.h"
extern char *untar(FILE *src_tar_file, FILE *output, const int untar_function,
const char *argument, const char *file_prefix)
{
typedef struct raw_tar_header {
char name[100]; /* 0-99 */
char mode[8]; /* 100-107 */
char uid[8]; /* 108-115 */
char gid[8]; /* 116-123 */
char size[12]; /* 124-135 */
char mtime[12]; /* 136-147 */
char chksum[8]; /* 148-155 */
char typeflag; /* 156-156 */
char linkname[100]; /* 157-256 */
char magic[6]; /* 257-262 */
char version[2]; /* 263-264 */
char uname[32]; /* 265-296 */
char gname[32]; /* 297-328 */
char devmajor[8]; /* 329-336 */
char devminor[8]; /* 337-344 */
char prefix[155]; /* 345-499 */
char padding[12]; /* 500-512 */
} raw_tar_header_t;
raw_tar_header_t raw_tar_header;
unsigned char *temp = (unsigned char *) &raw_tar_header;
long i;
long next_header_offset = 0;
long uncompressed_count = 0;
size_t size;
mode_t mode;
2001-04-12 15:49:08 +05:30
while (fread((char *) &raw_tar_header, 1, 512, src_tar_file) == 512) {
long sum = 0;
2001-04-12 17:18:02 +05:30
char *dir = NULL;
if (ferror(src_tar_file) || feof(src_tar_file)) {
perror_msg("untar: ");
break;
}
uncompressed_count += 512;
/* Check header has valid magic */
if (strncmp(raw_tar_header.magic, "ustar", 5) != 0) {
/*
* FIXME, Need HELP with this
*
* This has to fail silently or it incorrectly reports errors when called from
* deb_extract.
* The problem is deb_extract decompresses the .gz file in a child process and
* untar reads from the child proccess. The child process finishes and exits,
* but fread reads 0's from the src_tar_file even though the child
* closed its handle.
*/
// error_msg("Invalid tar magic");
break;
}
/* Do checksum on headers */
for (i = 0; i < 148 ; i++) {
sum += temp[i];
}
sum += ' ' * 8;
for (i = 156; i < 512 ; i++) {
sum += temp[i];
}
if (sum != strtol(raw_tar_header.chksum, NULL, 8)) {
error_msg("Invalid tar header checksum");
break;
}
/* convert to type'ed variables */
size = strtol(raw_tar_header.size, NULL, 8);
parse_mode(raw_tar_header.mode, &mode);
/* start of next header is at */
next_header_offset = uncompressed_count + size;
if (size % 512 != 0) {
next_header_offset += (512 - size % 512);
}
/* If an exclude list is specified check current file against list */
#if 0
if (*exclude_list != NULL) {
i = 0;
while (exclude_list[i] != 0) {
if (strncmp(exclude_list[i], raw_tar_header.name, strlen(raw_tar_header.name)) == 0) {
break;
}
i++;
}
if (exclude_list[i] != 0) {
continue;
}
}
#endif
if (untar_function & (extract_contents | extract_verbose_extract | extract_contents_to_file)) {
fprintf(output, "%s\n", raw_tar_header.name);
2001-04-12 17:18:02 +05:30
}
2001-04-12 17:18:02 +05:30
/* extract files */
if (untar_function & (extract_extract | extract_verbose_extract | extract_control)) {
dir = concat_path_file(argument, raw_tar_header.name);
2001-04-12 17:18:02 +05:30
create_path(dir, 0777);
}
switch (raw_tar_header.typeflag ) {
case '0':
case '\0':
/* If the name ends in a '/' then assume it is
* supposed to be a directory, and fall through
*/
if (raw_tar_header.name[strlen(raw_tar_header.name)-1] != '/') {
switch (untar_function) {
case (extract_extract):
case (extract_verbose_extract):
case (extract_control): {
FILE *dst_file = NULL;
char *full_name;
if (file_prefix != NULL) {
char *file_name = NULL, *file_extension = NULL;
file_extension = xmalloc(strlen(raw_tar_header.name) + 1);
file_extension = strrchr(raw_tar_header.name, '/');
file_extension++;
file_name = xmalloc(strlen(file_prefix) + strlen(file_extension) + 2);
strcpy(file_name, file_prefix);
strcat(file_name, ".");
strcat(file_name, file_extension);
full_name = concat_path_file(xstrndup(dir, strlen(dir) - strlen(strrchr(dir, '/'))), file_name);
} else {
full_name = xstrdup(dir);
}
dst_file = wfopen(full_name, "w");
copy_file_chunk(src_tar_file, dst_file, (unsigned long long) size);
uncompressed_count += size;
fclose(dst_file);
chmod(full_name, mode);
}
break;
case (extract_info):
if (strstr(raw_tar_header.name, argument) != NULL) {
copy_file_chunk(src_tar_file, stdout, (unsigned long long) size);
uncompressed_count += size;
}
break;
case (extract_field):
if (strstr(raw_tar_header.name, "./control") != NULL) {
return(read_text_file_to_buffer(src_tar_file));
}
break;
}
2001-04-12 15:49:08 +05:30
break;
}
case '5':
if (untar_function & (extract_extract | extract_verbose_extract | extract_control)) {
2001-04-12 17:18:02 +05:30
if (create_path(dir, mode) != TRUE) {
free(dir);
perror_msg("%s: Cannot mkdir", raw_tar_header.name);
return NULL;
2001-04-12 17:18:02 +05:30
}
}
break;
case '1':
if (untar_function & (extract_extract | extract_verbose_extract | extract_control)) {
if (link(raw_tar_header.linkname, raw_tar_header.name) < 0) {
free(dir);
perror_msg("%s: Cannot create hard link to '%s'", raw_tar_header.name, raw_tar_header.linkname);
return NULL;
}
}
break;
case '2':
if (untar_function & (extract_extract | extract_verbose_extract | extract_control)) {
if (symlink(raw_tar_header.linkname, raw_tar_header.name) < 0) {
free(dir);
perror_msg("%s: Cannot create symlink to '%s'", raw_tar_header.name, raw_tar_header.linkname);
return NULL;
}
}
break;
case '3':
case '4':
case '6':
// if (tarExtractSpecial( &header, extractFlag, tostdoutFlag)==FALSE)
// errorFlag=TRUE;
// break;
default:
error_msg("Unknown file type '%c' in tar file", raw_tar_header.typeflag);
free(dir);
return NULL;
}
/*
* Seek to start of next block, cant use fseek as unzip() does support it
*/
while (uncompressed_count < next_header_offset) {
if (fgetc(src_tar_file) == EOF) {
break;
}
uncompressed_count++;
}
2001-04-12 17:18:02 +05:30
// free(dir);
}
return NULL;
}