cargo/sources/registry/
mod.rs

1//! A `Source` for registry-based packages.
2//!
3//! # What's a Registry?
4//!
5//! [Registries] are central locations where packages can be uploaded to,
6//! discovered, and searched for. The purpose of a registry is to have a
7//! location that serves as permanent storage for versions of a crate over time.
8//!
9//! Compared to git sources (see [`GitSource`]), a registry provides many
10//! packages as well as many versions simultaneously. Git sources can also
11//! have commits deleted through rebasings where registries cannot have their
12//! versions deleted.
13//!
14//! In Cargo, [`RegistryData`] is an abstraction over each kind of actual
15//! registry, and [`RegistrySource`] connects those implementations to
16//! [`Source`] trait. Two prominent features these abstractions provide are
17//!
18//! * A way to query the metadata of a package from a registry. The metadata
19//!   comes from the index.
20//! * A way to download package contents (a.k.a source files) that are required
21//!   when building the package itself.
22//!
23//! We'll cover each functionality later.
24//!
25//! [Registries]: https://doc.rust-lang.org/nightly/cargo/reference/registries.html
26//! [`GitSource`]: super::GitSource
27//!
28//! # Different Kinds of Registries
29//!
30//! Cargo provides multiple kinds of registries. Each of them serves the index
31//! and package contents in a slightly different way. Namely,
32//!
33//! * [`LocalRegistry`] --- Serves the index and package contents entirely on
34//!   a local filesystem.
35//! * [`RemoteRegistry`] --- Serves the index ahead of time from a Git
36//!   repository, and package contents are downloaded as needed.
37//! * [`HttpRegistry`] --- Serves both the index and package contents on demand
38//!   over a HTTP-based registry API. This is the default starting from 1.70.0.
39//!
40//! Each registry has its own [`RegistryData`] implementation, and can be
41//! created from either [`RegistrySource::local`] or [`RegistrySource::remote`].
42//!
43//! [`LocalRegistry`]: local::LocalRegistry
44//! [`RemoteRegistry`]: remote::RemoteRegistry
45//! [`HttpRegistry`]: http_remote::HttpRegistry
46//!
47//! # The Index of a Registry
48//!
49//! One of the major difficulties with a registry is that hosting so many
50//! packages may quickly run into performance problems when dealing with
51//! dependency graphs. It's infeasible for cargo to download the entire contents
52//! of the registry just to resolve one package's dependencies, for example. As
53//! a result, cargo needs some efficient method of querying what packages are
54//! available on a registry, what versions are available, and what the
55//! dependencies for each version is.
56//!
57//! To solve the problem, a registry must provide an index of package metadata.
58//! The index of a registry is essentially an easily query-able version of the
59//! registry's database for a list of versions of a package as well as a list
60//! of dependencies for each version. The exact format of the index is
61//! described later.
62//!
63//! See the [`index`] module for topics about the management, parsing, caching,
64//! and versioning for the on-disk index.
65//!
66//! ## The Format of The Index
67//!
68//! The index is a store for the list of versions for all packages known, so its
69//! format on disk is optimized slightly to ensure that `ls registry` doesn't
70//! produce a list of all packages ever known. The index also wants to ensure
71//! that there's not a million files which may actually end up hitting
72//! filesystem limits at some point. To this end, a few decisions were made
73//! about the format of the registry:
74//!
75//! 1. Each crate will have one file corresponding to it. Each version for a
76//!    crate will just be a line in this file (see [`cargo_util_schemas::index::IndexPackage`] for its
77//!    representation).
78//! 2. There will be two tiers of directories for crate names, under which
79//!    crates corresponding to those tiers will be located.
80//!    (See [`cargo_util::registry::make_dep_path`] for the implementation of
81//!    this layout hierarchy.)
82//!
83//! As an example, this is an example hierarchy of an index:
84//!
85//! ```notrust
86//! .
87//! ├── 3
88//! │   └── u
89//! │       └── url
90//! ├── bz
91//! │   └── ip
92//! │       └── bzip2
93//! ├── config.json
94//! ├── en
95//! │   └── co
96//! │       └── encoding
97//! └── li
98//!     ├── bg
99//!     │   └── libgit2
100//!     └── nk
101//!         └── link-config
102//! ```
103//!
104//! The root of the index contains a `config.json` file with a few entries
105//! corresponding to the registry (see [`RegistryConfig`] below).
106//!
107//! Otherwise, there are three numbered directories (1, 2, 3) for crates with
108//! names 1, 2, and 3 characters in length. The 1/2 directories simply have the
109//! crate files underneath them, while the 3 directory is sharded by the first
110//! letter of the crate name.
111//!
112//! Otherwise the top-level directory contains many two-letter directory names,
113//! each of which has many sub-folders with two letters. At the end of all these
114//! are the actual crate files themselves.
115//!
116//! The purpose of this layout is to hopefully cut down on `ls` sizes as well as
117//! efficient lookup based on the crate name itself.
118//!
119//! See [The Cargo Book: Registry Index][registry-index] for the public
120//! interface on the index format.
121//!
122//! [registry-index]: https://doc.rust-lang.org/nightly/cargo/reference/registry-index.html
123//!
124//! ## The Index Files
125//!
126//! Each file in the index is the history of one crate over time. Each line in
127//! the file corresponds to one version of a crate, stored in JSON format (see
128//! the [`cargo_util_schemas::index::IndexPackage`] structure).
129//!
130//! As new versions are published, new lines are appended to this file. **The
131//! only modifications to this file that should happen over time are yanks of a
132//! particular version.**
133//!
134//! # Downloading Packages
135//!
136//! The purpose of the index was to provide an efficient method to resolve the
137//! dependency graph for a package. After resolution has been performed, we need
138//! to download the contents of packages so we can read the full manifest and
139//! build the source code.
140//!
141//! To accomplish this, [`RegistryData::download`] will "make" an HTTP request
142//! per-package requested to download tarballs into a local cache. These
143//! tarballs will then be unpacked into a destination folder.
144//!
145//! Note that because versions uploaded to the registry are frozen forever that
146//! the HTTP download and unpacking can all be skipped if the version has
147//! already been downloaded and unpacked. This caching allows us to only
148//! download a package when absolutely necessary.
149//!
150//! # Filesystem Hierarchy
151//!
152//! Overall, the `$HOME/.cargo` looks like this when talking about the registry
153//! (remote registries, specifically):
154//!
155//! ```notrust
156//! # A folder under which all registry metadata is hosted (similar to
157//! # $HOME/.cargo/git)
158//! $HOME/.cargo/registry/
159//!
160//!     # For each registry that cargo knows about (keyed by hostname + hash)
161//!     # there is a folder which is the checked out version of the index for
162//!     # the registry in this location. Note that this is done so cargo can
163//!     # support multiple registries simultaneously
164//!     index/
165//!         registry1-<hash>/
166//!         registry2-<hash>/
167//!         ...
168//!
169//!     # This folder is a cache for all downloaded tarballs (`.crate` file)
170//!     # from a registry. Once downloaded and verified, a tarball never changes.
171//!     cache/
172//!         registry1-<hash>/<pkg>-<version>.crate
173//!         ...
174//!
175//!     # Location in which all tarballs are unpacked. Each tarball is known to
176//!     # be frozen after downloading, so transitively this folder is also
177//!     # frozen once its unpacked (it's never unpacked again)
178//!     # CAVEAT: They are not read-only. See rust-lang/cargo#9455.
179//!     src/
180//!         registry1-<hash>/<pkg>-<version>/...
181//!         ...
182//! ```
183//!
184
185use std::collections::HashSet;
186use std::fs;
187use std::fs::{File, OpenOptions};
188use std::io;
189use std::io::Read;
190use std::io::Write;
191use std::path::{Path, PathBuf};
192use std::task::{Poll, ready};
193
194use annotate_snippets::Level;
195use anyhow::Context as _;
196use cargo_util::paths::{self, exclude_from_backups_and_indexing};
197use flate2::read::GzDecoder;
198use serde::Deserialize;
199use serde::Serialize;
200use tar::Archive;
201use tracing::debug;
202
203use crate::core::dependency::Dependency;
204use crate::core::global_cache_tracker;
205use crate::core::{Package, PackageId, SourceId};
206use crate::sources::PathSource;
207use crate::sources::source::MaybePackage;
208use crate::sources::source::QueryKind;
209use crate::sources::source::Source;
210use crate::util::cache_lock::CacheLockMode;
211use crate::util::interning::InternedString;
212use crate::util::network::PollExt;
213use crate::util::{CargoResult, Filesystem, GlobalContext, LimitErrorReader, restricted_names};
214use crate::util::{VersionExt, hex};
215
216/// The `.cargo-ok` file is used to track if the source is already unpacked.
217/// See [`RegistrySource::unpack_package`] for more.
218///
219/// Not to be confused with `.cargo-ok` file in git sources.
220const PACKAGE_SOURCE_LOCK: &str = ".cargo-ok";
221
222pub const CRATES_IO_INDEX: &str = "https://github.com/rust-lang/crates.io-index";
223pub const CRATES_IO_HTTP_INDEX: &str = "sparse+https://index.crates.io/";
224pub const CRATES_IO_REGISTRY: &str = "crates-io";
225pub const CRATES_IO_DOMAIN: &str = "crates.io";
226
227/// The content inside `.cargo-ok`.
228/// See [`RegistrySource::unpack_package`] for more.
229#[derive(Deserialize, Serialize)]
230#[serde(rename_all = "kebab-case")]
231struct LockMetadata {
232    /// The version of `.cargo-ok` file
233    v: u32,
234}
235
236/// A [`Source`] implementation for a local or a remote registry.
237///
238/// This contains common functionality that is shared between each registry
239/// kind, with the registry-specific logic implemented as part of the
240/// [`RegistryData`] trait referenced via the `ops` field.
241///
242/// For general concepts of registries, see the [module-level documentation](crate::sources::registry).
243pub struct RegistrySource<'gctx> {
244    /// A unique name of the source (typically used as the directory name
245    /// where its cached content is stored).
246    name: InternedString,
247    /// The unique identifier of this source.
248    source_id: SourceId,
249    /// The path where crate files are extracted (`$CARGO_HOME/registry/src/$REG-HASH`).
250    src_path: Filesystem,
251    /// Path to the cache of `.crate` files (`$CARGO_HOME/registry/cache/$REG-HASH`).
252    cache_path: Filesystem,
253    /// Local reference to [`GlobalContext`] for convenience.
254    gctx: &'gctx GlobalContext,
255    /// Abstraction for interfacing to the different registry kinds.
256    ops: Box<dyn RegistryData + 'gctx>,
257    /// Interface for managing the on-disk index.
258    index: index::RegistryIndex<'gctx>,
259    /// A set of packages that should be allowed to be used, even if they are
260    /// yanked.
261    ///
262    /// This is populated from the entries in `Cargo.lock` to ensure that
263    /// `cargo update somepkg` won't unlock yanked entries in `Cargo.lock`.
264    /// Otherwise, the resolver would think that those entries no longer
265    /// exist, and it would trigger updates to unrelated packages.
266    yanked_whitelist: HashSet<PackageId>,
267    /// Yanked versions that have already been selected during queries.
268    ///
269    /// As of this writing, this is for not emitting the `--precise <yanked>`
270    /// warning twice, with the assumption of (`dep.package_name()` + `--precise`
271    /// version) being sufficient to uniquely identify the same query result.
272    selected_precise_yanked: HashSet<(InternedString, semver::Version)>,
273}
274
275/// The [`config.json`] file stored in the index.
276///
277/// The config file may look like:
278///
279/// ```json
280/// {
281///     "dl": "https://example.com/api/{crate}/{version}/download",
282///     "api": "https://example.com/api",
283///     "auth-required": false             # unstable feature (RFC 3139)
284/// }
285/// ```
286///
287/// [`config.json`]: https://doc.rust-lang.org/nightly/cargo/reference/registry-index.html#index-configuration
288#[derive(Deserialize, Debug, Clone)]
289#[serde(rename_all = "kebab-case")]
290pub struct RegistryConfig {
291    /// Download endpoint for all crates.
292    ///
293    /// The string is a template which will generate the download URL for the
294    /// tarball of a specific version of a crate. The substrings `{crate}` and
295    /// `{version}` will be replaced with the crate's name and version
296    /// respectively.  The substring `{prefix}` will be replaced with the
297    /// crate's prefix directory name, and the substring `{lowerprefix}` will
298    /// be replaced with the crate's prefix directory name converted to
299    /// lowercase. The substring `{sha256-checksum}` will be replaced with the
300    /// crate's sha256 checksum.
301    ///
302    /// For backwards compatibility, if the string does not contain any
303    /// markers (`{crate}`, `{version}`, `{prefix}`, or `{lowerprefix}`), it
304    /// will be extended with `/{crate}/{version}/download` to
305    /// support registries like crates.io which were created before the
306    /// templating setup was created.
307    ///
308    /// For more on the template of the download URL, see [Index Configuration](
309    /// https://doc.rust-lang.org/nightly/cargo/reference/registry-index.html#index-configuration).
310    pub dl: String,
311
312    /// API endpoint for the registry. This is what's actually hit to perform
313    /// operations like yanks, owner modifications, publish new crates, etc.
314    /// If this is None, the registry does not support API commands.
315    pub api: Option<String>,
316
317    /// Whether all operations require authentication. See [RFC 3139].
318    ///
319    /// [RFC 3139]: https://rust-lang.github.io/rfcs/3139-cargo-alternative-registry-auth.html
320    #[serde(default)]
321    pub auth_required: bool,
322}
323
324/// Result from loading data from a registry.
325pub enum LoadResponse {
326    /// The cache is valid. The cached data should be used.
327    CacheValid,
328
329    /// The cache is out of date. Returned data should be used.
330    Data {
331        raw_data: Vec<u8>,
332        /// Version of this data to determine whether it is out of date.
333        index_version: Option<String>,
334    },
335
336    /// The requested crate was found.
337    NotFound,
338}
339
340/// An abstract interface to handle both a local and remote registry.
341///
342/// This allows [`RegistrySource`] to abstractly handle each registry kind.
343///
344/// For general concepts of registries, see the [module-level documentation](crate::sources::registry).
345pub trait RegistryData {
346    /// Performs initialization for the registry.
347    ///
348    /// This should be safe to call multiple times, the implementation is
349    /// expected to not do any work if it is already prepared.
350    fn prepare(&self) -> CargoResult<()>;
351
352    /// Returns the path to the index.
353    ///
354    /// Note that different registries store the index in different formats
355    /// (remote = git, http & local = files).
356    fn index_path(&self) -> &Filesystem;
357
358    /// Loads the JSON for a specific named package from the index.
359    ///
360    /// * `root` is the root path to the index.
361    /// * `path` is the relative path to the package to load (like `ca/rg/cargo`).
362    /// * `index_version` is the version of the requested crate data currently
363    ///    in cache. This is useful for checking if a local cache is outdated.
364    fn load(
365        &mut self,
366        root: &Path,
367        path: &Path,
368        index_version: Option<&str>,
369    ) -> Poll<CargoResult<LoadResponse>>;
370
371    /// Loads the `config.json` file and returns it.
372    ///
373    /// Local registries don't have a config, and return `None`.
374    fn config(&mut self) -> Poll<CargoResult<Option<RegistryConfig>>>;
375
376    /// Invalidates locally cached data.
377    fn invalidate_cache(&mut self);
378
379    /// If quiet, the source should not display any progress or status messages.
380    fn set_quiet(&mut self, quiet: bool);
381
382    /// Is the local cached data up-to-date?
383    fn is_updated(&self) -> bool;
384
385    /// Prepare to start downloading a `.crate` file.
386    ///
387    /// Despite the name, this doesn't actually download anything. If the
388    /// `.crate` is already downloaded, then it returns [`MaybeLock::Ready`].
389    /// If it hasn't been downloaded, then it returns [`MaybeLock::Download`]
390    /// which contains the URL to download. The [`crate::core::package::Downloads`]
391    /// system handles the actual download process. After downloading, it
392    /// calls [`Self::finish_download`] to save the downloaded file.
393    ///
394    /// `checksum` is currently only used by local registries to verify the
395    /// file contents (because local registries never actually download
396    /// anything). Remote registries will validate the checksum in
397    /// `finish_download`. For already downloaded `.crate` files, it does not
398    /// validate the checksum, assuming the filesystem does not suffer from
399    /// corruption or manipulation.
400    fn download(&mut self, pkg: PackageId, checksum: &str) -> CargoResult<MaybeLock>;
401
402    /// Finish a download by saving a `.crate` file to disk.
403    ///
404    /// After [`crate::core::package::Downloads`] has finished a download,
405    /// it will call this to save the `.crate` file. This is only relevant
406    /// for remote registries. This should validate the checksum and save
407    /// the given data to the on-disk cache.
408    ///
409    /// Returns a [`File`] handle to the `.crate` file, positioned at the start.
410    fn finish_download(&mut self, pkg: PackageId, checksum: &str, data: &[u8])
411    -> CargoResult<File>;
412
413    /// Returns whether or not the `.crate` file is already downloaded.
414    fn is_crate_downloaded(&self, _pkg: PackageId) -> bool {
415        true
416    }
417
418    /// Validates that the global package cache lock is held.
419    ///
420    /// Given the [`Filesystem`], this will make sure that the package cache
421    /// lock is held. If not, it will panic. See
422    /// [`GlobalContext::acquire_package_cache_lock`] for acquiring the global lock.
423    ///
424    /// Returns the [`Path`] to the [`Filesystem`].
425    fn assert_index_locked<'a>(&self, path: &'a Filesystem) -> &'a Path;
426
427    /// Block until all outstanding `Poll::Pending` requests are `Poll::Ready`.
428    fn block_until_ready(&mut self) -> CargoResult<()>;
429}
430
431/// The status of [`RegistryData::download`] which indicates if a `.crate`
432/// file has already been downloaded, or if not then the URL to download.
433pub enum MaybeLock {
434    /// The `.crate` file is already downloaded. [`File`] is a handle to the
435    /// opened `.crate` file on the filesystem.
436    Ready(File),
437    /// The `.crate` file is not downloaded, here's the URL to download it from.
438    ///
439    /// `descriptor` is just a text string to display to the user of what is
440    /// being downloaded.
441    Download {
442        url: String,
443        descriptor: String,
444        authorization: Option<String>,
445    },
446}
447
448mod download;
449mod http_remote;
450pub(crate) mod index;
451pub use index::IndexSummary;
452mod local;
453mod remote;
454
455/// Generates a unique name for [`SourceId`] to have a unique path to put their
456/// index files.
457fn short_name(id: SourceId, is_shallow: bool) -> String {
458    // CAUTION: This should not change between versions. If you change how
459    // this is computed, it will orphan previously cached data, forcing the
460    // cache to be rebuilt and potentially wasting significant disk space. If
461    // you change it, be cautious of the impact. See `test_cratesio_hash` for
462    // a similar discussion.
463    let hash = hex::short_hash(&id);
464    let ident = id.url().host_str().unwrap_or("").to_string();
465    let mut name = format!("{}-{}", ident, hash);
466    if is_shallow {
467        name.push_str("-shallow");
468    }
469    name
470}
471
472impl<'gctx> RegistrySource<'gctx> {
473    /// Creates a [`Source`] of a "remote" registry.
474    /// It could be either an HTTP-based [`http_remote::HttpRegistry`] or
475    /// a Git-based [`remote::RemoteRegistry`].
476    ///
477    /// * `yanked_whitelist` --- Packages allowed to be used, even if they are yanked.
478    pub fn remote(
479        source_id: SourceId,
480        yanked_whitelist: &HashSet<PackageId>,
481        gctx: &'gctx GlobalContext,
482    ) -> CargoResult<RegistrySource<'gctx>> {
483        assert!(source_id.is_remote_registry());
484        let name = short_name(
485            source_id,
486            gctx.cli_unstable()
487                .git
488                .map_or(false, |features| features.shallow_index)
489                && !source_id.is_sparse(),
490        );
491        let ops = if source_id.is_sparse() {
492            Box::new(http_remote::HttpRegistry::new(source_id, gctx, &name)?) as Box<_>
493        } else {
494            Box::new(remote::RemoteRegistry::new(source_id, gctx, &name)) as Box<_>
495        };
496
497        Ok(RegistrySource::new(
498            source_id,
499            gctx,
500            &name,
501            ops,
502            yanked_whitelist,
503        ))
504    }
505
506    /// Creates a [`Source`] of a local registry, with [`local::LocalRegistry`] under the hood.
507    ///
508    /// * `path` --- The root path of a local registry on the file system.
509    /// * `yanked_whitelist` --- Packages allowed to be used, even if they are yanked.
510    pub fn local(
511        source_id: SourceId,
512        path: &Path,
513        yanked_whitelist: &HashSet<PackageId>,
514        gctx: &'gctx GlobalContext,
515    ) -> RegistrySource<'gctx> {
516        let name = short_name(source_id, false);
517        let ops = local::LocalRegistry::new(path, gctx, &name);
518        RegistrySource::new(source_id, gctx, &name, Box::new(ops), yanked_whitelist)
519    }
520
521    /// Creates a source of a registry. This is a inner helper function.
522    ///
523    /// * `name` --- Name of a path segment which may affect where `.crate`
524    ///   tarballs, the registry index and cache are stored. Expect to be unique.
525    /// * `ops` --- The underlying [`RegistryData`] type.
526    /// * `yanked_whitelist` --- Packages allowed to be used, even if they are yanked.
527    fn new(
528        source_id: SourceId,
529        gctx: &'gctx GlobalContext,
530        name: &str,
531        ops: Box<dyn RegistryData + 'gctx>,
532        yanked_whitelist: &HashSet<PackageId>,
533    ) -> RegistrySource<'gctx> {
534        RegistrySource {
535            name: name.into(),
536            src_path: gctx.registry_source_path().join(name),
537            cache_path: gctx.registry_cache_path().join(name),
538            gctx,
539            source_id,
540            index: index::RegistryIndex::new(source_id, ops.index_path(), gctx),
541            yanked_whitelist: yanked_whitelist.clone(),
542            ops,
543            selected_precise_yanked: HashSet::new(),
544        }
545    }
546
547    /// Decode the [configuration](RegistryConfig) stored within the registry.
548    ///
549    /// This requires that the index has been at least checked out.
550    pub fn config(&mut self) -> Poll<CargoResult<Option<RegistryConfig>>> {
551        self.ops.config()
552    }
553
554    /// Unpacks a downloaded package into a location where it's ready to be
555    /// compiled.
556    ///
557    /// No action is taken if the source looks like it's already unpacked.
558    ///
559    /// # History of interruption detection with `.cargo-ok` file
560    ///
561    /// Cargo has always included a `.cargo-ok` file ([`PACKAGE_SOURCE_LOCK`])
562    /// to detect if extraction was interrupted, but it was originally empty.
563    ///
564    /// In 1.34, Cargo was changed to create the `.cargo-ok` file before it
565    /// started extraction to implement fine-grained locking. After it was
566    /// finished extracting, it wrote two bytes to indicate it was complete.
567    /// It would use the length check to detect if it was possibly interrupted.
568    ///
569    /// In 1.36, Cargo changed to not use fine-grained locking, and instead used
570    /// a global lock. The use of `.cargo-ok` was no longer needed for locking
571    /// purposes, but was kept to detect when extraction was interrupted.
572    ///
573    /// In 1.49, Cargo changed to not create the `.cargo-ok` file before it
574    /// started extraction to deal with `.crate` files that inexplicably had
575    /// a `.cargo-ok` file in them.
576    ///
577    /// In 1.64, Cargo changed to detect `.crate` files with `.cargo-ok` files
578    /// in them in response to [CVE-2022-36113], which dealt with malicious
579    /// `.crate` files making `.cargo-ok` a symlink causing cargo to write "ok"
580    /// to any arbitrary file on the filesystem it has permission to.
581    ///
582    /// In 1.71, `.cargo-ok` changed to contain a JSON `{ v: 1 }` to indicate
583    /// the version of it. A failure of parsing will result in a heavy-hammer
584    /// approach that unpacks the `.crate` file again. This is in response to a
585    /// security issue that the unpacking didn't respect umask on Unix systems.
586    ///
587    /// This is all a long-winded way of explaining the circumstances that might
588    /// cause a directory to contain a `.cargo-ok` file that is empty or
589    /// otherwise corrupted. Either this was extracted by a version of Rust
590    /// before 1.34, in which case everything should be fine. However, an empty
591    /// file created by versions 1.36 to 1.49 indicates that the extraction was
592    /// interrupted and that we need to start again.
593    ///
594    /// Another possibility is that the filesystem is simply corrupted, in
595    /// which case deleting the directory might be the safe thing to do. That
596    /// is probably unlikely, though.
597    ///
598    /// To be safe, we delete the directory and start over again if an empty
599    /// `.cargo-ok` file is found.
600    ///
601    /// [CVE-2022-36113]: https://blog.rust-lang.org/2022/09/14/cargo-cves.html#arbitrary-file-corruption-cve-2022-36113
602    fn unpack_package(&self, pkg: PackageId, tarball: &File) -> CargoResult<PathBuf> {
603        let package_dir = format!("{}-{}", pkg.name(), pkg.version());
604        let dst = self.src_path.join(&package_dir);
605        let path = dst.join(PACKAGE_SOURCE_LOCK);
606        let path = self
607            .gctx
608            .assert_package_cache_locked(CacheLockMode::DownloadExclusive, &path);
609        let unpack_dir = path.parent().unwrap();
610        match fs::read_to_string(path) {
611            Ok(ok) => match serde_json::from_str::<LockMetadata>(&ok) {
612                Ok(lock_meta) if lock_meta.v == 1 => {
613                    self.gctx
614                        .deferred_global_last_use()?
615                        .mark_registry_src_used(global_cache_tracker::RegistrySrc {
616                            encoded_registry_name: self.name,
617                            package_dir: package_dir.into(),
618                            size: None,
619                        });
620                    return Ok(unpack_dir.to_path_buf());
621                }
622                _ => {
623                    if ok == "ok" {
624                        tracing::debug!("old `ok` content found, clearing cache");
625                    } else {
626                        tracing::warn!("unrecognized .cargo-ok content, clearing cache: {ok}");
627                    }
628                    // See comment of `unpack_package` about why removing all stuff.
629                    paths::remove_dir_all(dst.as_path_unlocked())?;
630                }
631            },
632            Err(e) if e.kind() == io::ErrorKind::NotFound => {}
633            Err(e) => anyhow::bail!("unable to read .cargo-ok file at {path:?}: {e}"),
634        }
635        dst.create_dir()?;
636
637        let bytes_written = unpack(self.gctx, tarball, unpack_dir, &|_| true)?;
638        update_mtime_for_generated_files(unpack_dir);
639
640        // Now that we've finished unpacking, create and write to the lock file to indicate that
641        // unpacking was successful.
642        let mut ok = OpenOptions::new()
643            .create_new(true)
644            .read(true)
645            .write(true)
646            .open(&path)
647            .with_context(|| format!("failed to open `{}`", path.display()))?;
648
649        let lock_meta = LockMetadata { v: 1 };
650        write!(ok, "{}", serde_json::to_string(&lock_meta).unwrap())?;
651
652        self.gctx
653            .deferred_global_last_use()?
654            .mark_registry_src_used(global_cache_tracker::RegistrySrc {
655                encoded_registry_name: self.name,
656                package_dir: package_dir.into(),
657                size: Some(bytes_written),
658            });
659
660        Ok(unpack_dir.to_path_buf())
661    }
662
663    /// Unpacks the `.crate` tarball of the package in a given directory.
664    ///
665    /// Returns the path to the crate tarball directory,
666    /// which is always `<unpack_dir>/<pkg>-<version>`.
667    ///
668    /// This holds an assumption that the associated tarball already exists.
669    pub fn unpack_package_in(
670        &self,
671        pkg: &PackageId,
672        unpack_dir: &Path,
673        include: &dyn Fn(&Path) -> bool,
674    ) -> CargoResult<PathBuf> {
675        let path = self.cache_path.join(pkg.tarball_name());
676        let path = self
677            .gctx
678            .assert_package_cache_locked(CacheLockMode::DownloadExclusive, &path);
679        let dst = unpack_dir.join(format!("{}-{}", pkg.name(), pkg.version()));
680        let tarball =
681            File::open(path).with_context(|| format!("failed to open {}", path.display()))?;
682        unpack(self.gctx, &tarball, &dst, include)?;
683        update_mtime_for_generated_files(&dst);
684        Ok(dst)
685    }
686
687    /// Turns the downloaded `.crate` tarball file into a [`Package`].
688    ///
689    /// This unconditionally sets checksum for the returned package, so it
690    /// should only be called after doing integrity check. That is to say,
691    /// you need to call either [`RegistryData::download`] or
692    /// [`RegistryData::finish_download`] before calling this method.
693    fn get_pkg(&mut self, package: PackageId, path: &File) -> CargoResult<Package> {
694        let path = self
695            .unpack_package(package, path)
696            .with_context(|| format!("failed to unpack package `{}`", package))?;
697        let mut src = PathSource::new(&path, self.source_id, self.gctx);
698        src.load()?;
699        let mut pkg = match src.download(package)? {
700            MaybePackage::Ready(pkg) => pkg,
701            MaybePackage::Download { .. } => unreachable!(),
702        };
703
704        // After we've loaded the package configure its summary's `checksum`
705        // field with the checksum we know for this `PackageId`.
706        let cksum = self
707            .index
708            .hash(package, &mut *self.ops)
709            .expect("a downloaded dep now pending!?")
710            .expect("summary not found");
711        pkg.manifest_mut()
712            .summary_mut()
713            .set_checksum(cksum.to_string());
714
715        Ok(pkg)
716    }
717}
718
719impl<'gctx> Source for RegistrySource<'gctx> {
720    fn query(
721        &mut self,
722        dep: &Dependency,
723        kind: QueryKind,
724        f: &mut dyn FnMut(IndexSummary),
725    ) -> Poll<CargoResult<()>> {
726        let mut req = dep.version_req().clone();
727
728        // Handle `cargo update --precise` here.
729        if let Some((_, requested)) = self
730            .source_id
731            .precise_registry_version(dep.package_name().as_str())
732            .filter(|(c, to)| {
733                if to.is_prerelease() && self.gctx.cli_unstable().unstable_options {
734                    req.matches_prerelease(c)
735                } else {
736                    req.matches(c)
737                }
738            })
739        {
740            req.precise_to(&requested);
741        }
742
743        let mut called = false;
744        let callback = &mut |s| {
745            called = true;
746            f(s);
747        };
748
749        // If this is a locked dependency, then it came from a lock file and in
750        // theory the registry is known to contain this version. If, however, we
751        // come back with no summaries, then our registry may need to be
752        // updated, so we fall back to performing a lazy update.
753        if kind == QueryKind::Exact && req.is_locked() && !self.ops.is_updated() {
754            debug!("attempting query without update");
755            ready!(
756                self.index
757                    .query_inner(dep.package_name(), &req, &mut *self.ops, &mut |s| {
758                        if matches!(s, IndexSummary::Candidate(_) | IndexSummary::Yanked(_))
759                            && dep.matches(s.as_summary())
760                        {
761                            // We are looking for a package from a lock file so we do not care about yank
762                            callback(s)
763                        }
764                    },)
765            )?;
766            if called {
767                Poll::Ready(Ok(()))
768            } else {
769                debug!("falling back to an update");
770                self.invalidate_cache();
771                Poll::Pending
772            }
773        } else {
774            let mut precise_yanked_in_use = false;
775            ready!(
776                self.index
777                    .query_inner(dep.package_name(), &req, &mut *self.ops, &mut |s| {
778                        let matched = match kind {
779                            QueryKind::Exact | QueryKind::RejectedVersions => {
780                                if req.is_precise() && self.gctx.cli_unstable().unstable_options {
781                                    dep.matches_prerelease(s.as_summary())
782                                } else {
783                                    dep.matches(s.as_summary())
784                                }
785                            }
786                            QueryKind::AlternativeNames => true,
787                            QueryKind::Normalized => true,
788                        };
789                        if !matched {
790                            return;
791                        }
792                        // Next filter out all yanked packages. Some yanked packages may
793                        // leak through if they're in a whitelist (aka if they were
794                        // previously in `Cargo.lock`
795                        match s {
796                            s @ _ if kind == QueryKind::RejectedVersions => callback(s),
797                            s @ IndexSummary::Candidate(_) => callback(s),
798                            s @ IndexSummary::Yanked(_) => {
799                                if self.yanked_whitelist.contains(&s.package_id()) {
800                                    callback(s);
801                                } else if req.is_precise() {
802                                    precise_yanked_in_use = true;
803                                    callback(s);
804                                }
805                            }
806                            IndexSummary::Unsupported(summary, v) => {
807                                tracing::debug!(
808                                    "unsupported schema version {} ({} {})",
809                                    v,
810                                    summary.name(),
811                                    summary.version()
812                                );
813                            }
814                            IndexSummary::Invalid(summary) => {
815                                tracing::debug!(
816                                    "invalid ({} {})",
817                                    summary.name(),
818                                    summary.version()
819                                );
820                            }
821                            IndexSummary::Offline(summary) => {
822                                tracing::debug!(
823                                    "offline ({} {})",
824                                    summary.name(),
825                                    summary.version()
826                                );
827                            }
828                        }
829                    })
830            )?;
831            if precise_yanked_in_use {
832                let name = dep.package_name();
833                let version = req
834                    .precise_version()
835                    .expect("--precise <yanked-version> in use");
836                if self.selected_precise_yanked.insert((name, version.clone())) {
837                    let mut shell = self.gctx.shell();
838                    shell.print_report(
839                        &[Level::WARNING
840                            .secondary_title(format!(
841                                "selected package `{name}@{version}` was yanked by the author"
842                            ))
843                            .element(
844                                Level::HELP
845                                    .message("if possible, try a compatible non-yanked version"),
846                            )],
847                        false,
848                    )?;
849                }
850            }
851            if called {
852                return Poll::Ready(Ok(()));
853            }
854            let mut any_pending = false;
855            if kind == QueryKind::AlternativeNames || kind == QueryKind::Normalized {
856                // Attempt to handle misspellings by searching for a chain of related
857                // names to the original name. The resolver will later
858                // reject any candidates that have the wrong name, and with this it'll
859                // have enough information to offer "a similar crate exists" suggestions.
860                // For now we only try canonicalizing `-` to `_` and vice versa.
861                // More advanced fuzzy searching become in the future.
862                for name_permutation in [
863                    dep.package_name().replace('-', "_"),
864                    dep.package_name().replace('_', "-"),
865                ] {
866                    let name_permutation = name_permutation.into();
867                    if name_permutation == dep.package_name() {
868                        continue;
869                    }
870                    any_pending |= self
871                        .index
872                        .query_inner(name_permutation, &req, &mut *self.ops, &mut |s| {
873                            if !s.is_yanked() {
874                                f(s);
875                            } else if kind == QueryKind::AlternativeNames {
876                                f(s);
877                            }
878                        })?
879                        .is_pending();
880                }
881            }
882            if any_pending {
883                Poll::Pending
884            } else {
885                Poll::Ready(Ok(()))
886            }
887        }
888    }
889
890    fn supports_checksums(&self) -> bool {
891        true
892    }
893
894    fn requires_precise(&self) -> bool {
895        false
896    }
897
898    fn source_id(&self) -> SourceId {
899        self.source_id
900    }
901
902    fn invalidate_cache(&mut self) {
903        self.index.clear_summaries_cache();
904        self.ops.invalidate_cache();
905    }
906
907    fn set_quiet(&mut self, quiet: bool) {
908        self.ops.set_quiet(quiet);
909    }
910
911    fn download(&mut self, package: PackageId) -> CargoResult<MaybePackage> {
912        let hash = loop {
913            match self.index.hash(package, &mut *self.ops)? {
914                Poll::Pending => self.block_until_ready()?,
915                Poll::Ready(hash) => break hash,
916            }
917        };
918        match self.ops.download(package, hash)? {
919            MaybeLock::Ready(file) => self.get_pkg(package, &file).map(MaybePackage::Ready),
920            MaybeLock::Download {
921                url,
922                descriptor,
923                authorization,
924            } => Ok(MaybePackage::Download {
925                url,
926                descriptor,
927                authorization,
928            }),
929        }
930    }
931
932    fn finish_download(&mut self, package: PackageId, data: Vec<u8>) -> CargoResult<Package> {
933        let hash = loop {
934            match self.index.hash(package, &mut *self.ops)? {
935                Poll::Pending => self.block_until_ready()?,
936                Poll::Ready(hash) => break hash,
937            }
938        };
939        let file = self.ops.finish_download(package, hash, &data)?;
940        self.get_pkg(package, &file)
941    }
942
943    fn fingerprint(&self, pkg: &Package) -> CargoResult<String> {
944        Ok(pkg.package_id().version().to_string())
945    }
946
947    fn describe(&self) -> String {
948        self.source_id.display_index()
949    }
950
951    fn add_to_yanked_whitelist(&mut self, pkgs: &[PackageId]) {
952        self.yanked_whitelist.extend(pkgs);
953    }
954
955    fn is_yanked(&mut self, pkg: PackageId) -> Poll<CargoResult<bool>> {
956        self.index.is_yanked(pkg, &mut *self.ops)
957    }
958
959    fn block_until_ready(&mut self) -> CargoResult<()> {
960        // Before starting to work on the registry, make sure that
961        // `<cargo_home>/registry` is marked as excluded from indexing and
962        // backups. Older versions of Cargo didn't do this, so we do it here
963        // regardless of whether `<cargo_home>` exists.
964        //
965        // This does not use `create_dir_all_excluded_from_backups_atomic` for
966        // the same reason: we want to exclude it even if the directory already
967        // exists.
968        //
969        // IO errors in creating and marking it are ignored, e.g. in case we're on a
970        // read-only filesystem.
971        let registry_base = self.gctx.registry_base_path();
972        let _ = registry_base.create_dir();
973        exclude_from_backups_and_indexing(&registry_base.into_path_unlocked());
974
975        self.ops.block_until_ready()
976    }
977}
978
979impl RegistryConfig {
980    /// File name of [`RegistryConfig`].
981    const NAME: &'static str = "config.json";
982}
983
984/// Get the maximum unpack size that Cargo permits
985/// based on a given `size` of your compressed file.
986///
987/// Returns the larger one between `size * max compression ratio`
988/// and a fixed max unpacked size.
989///
990/// In reality, the compression ratio usually falls in the range of 2:1 to 10:1.
991/// We choose 20:1 to cover almost all possible cases hopefully.
992/// Any ratio higher than this is considered as a zip bomb.
993///
994/// In the future we might want to introduce a configurable size.
995///
996/// Some of the real world data from common compression algorithms:
997///
998/// * <https://www.zlib.net/zlib_tech.html>
999/// * <https://cran.r-project.org/web/packages/brotli/vignettes/brotli-2015-09-22.pdf>
1000/// * <https://blog.cloudflare.com/results-experimenting-brotli/>
1001/// * <https://tukaani.org/lzma/benchmarks.html>
1002fn max_unpack_size(gctx: &GlobalContext, size: u64) -> u64 {
1003    const SIZE_VAR: &str = "__CARGO_TEST_MAX_UNPACK_SIZE";
1004    const RATIO_VAR: &str = "__CARGO_TEST_MAX_UNPACK_RATIO";
1005    const MAX_UNPACK_SIZE: u64 = 512 * 1024 * 1024; // 512 MiB
1006    const MAX_COMPRESSION_RATIO: usize = 20; // 20:1
1007
1008    let max_unpack_size = if cfg!(debug_assertions) && gctx.get_env(SIZE_VAR).is_ok() {
1009        // For integration test only.
1010        gctx.get_env(SIZE_VAR)
1011            .unwrap()
1012            .parse()
1013            .expect("a max unpack size in bytes")
1014    } else {
1015        MAX_UNPACK_SIZE
1016    };
1017    let max_compression_ratio = if cfg!(debug_assertions) && gctx.get_env(RATIO_VAR).is_ok() {
1018        // For integration test only.
1019        gctx.get_env(RATIO_VAR)
1020            .unwrap()
1021            .parse()
1022            .expect("a max compression ratio in bytes")
1023    } else {
1024        MAX_COMPRESSION_RATIO
1025    };
1026
1027    u64::max(max_unpack_size, size * max_compression_ratio as u64)
1028}
1029
1030/// Set the current [`umask`] value for the given tarball. No-op on non-Unix
1031/// platforms.
1032///
1033/// On Windows, tar only looks at user permissions and tries to set the "read
1034/// only" attribute, so no-op as well.
1035///
1036/// [`umask`]: https://man7.org/linux/man-pages/man2/umask.2.html
1037#[allow(unused_variables)]
1038fn set_mask<R: Read>(tar: &mut Archive<R>) {
1039    #[cfg(unix)]
1040    tar.set_mask(crate::util::get_umask());
1041}
1042
1043/// Unpack a tarball with zip bomb and overwrite protections.
1044fn unpack(
1045    gctx: &GlobalContext,
1046    tarball: &File,
1047    unpack_dir: &Path,
1048    include: &dyn Fn(&Path) -> bool,
1049) -> CargoResult<u64> {
1050    let mut tar = {
1051        let size_limit = max_unpack_size(gctx, tarball.metadata()?.len());
1052        let gz = GzDecoder::new(tarball);
1053        let gz = LimitErrorReader::new(gz, size_limit);
1054        let mut tar = Archive::new(gz);
1055        set_mask(&mut tar);
1056        tar
1057    };
1058    let mut bytes_written = 0;
1059    let prefix = unpack_dir.file_name().unwrap();
1060    let parent = unpack_dir.parent().unwrap();
1061    for entry in tar.entries()? {
1062        let mut entry = entry.context("failed to iterate over archive")?;
1063        let entry_path = entry
1064            .path()
1065            .context("failed to read entry path")?
1066            .into_owned();
1067
1068        if let Ok(path) = entry_path.strip_prefix(prefix) {
1069            if !include(path) {
1070                continue;
1071            }
1072        } else {
1073            // We're going to unpack this tarball into the global source
1074            // directory, but we want to make sure that it doesn't accidentally
1075            // (or maliciously) overwrite source code from other crates. Cargo
1076            // itself should never generate a tarball that hits this error, and
1077            // crates.io should also block uploads with these sorts of tarballs,
1078            // but be extra sure by adding a check here as well.
1079            anyhow::bail!(
1080                "invalid tarball downloaded, contains \
1081                     a file at {entry_path:?} which isn't under {prefix:?}",
1082            )
1083        }
1084
1085        // Prevent unpacking the lockfile from the crate itself.
1086        if entry_path
1087            .file_name()
1088            .map_or(false, |p| p == PACKAGE_SOURCE_LOCK)
1089        {
1090            continue;
1091        }
1092        // Unpacking failed
1093        bytes_written += entry.size();
1094        let mut result = entry.unpack_in(parent).map_err(anyhow::Error::from);
1095        if cfg!(windows) && restricted_names::is_windows_reserved_path(&entry_path) {
1096            result = result.with_context(|| {
1097                format!(
1098                    "`{}` appears to contain a reserved Windows path, \
1099                        it cannot be extracted on Windows",
1100                    entry_path.display()
1101                )
1102            });
1103        }
1104        result.with_context(|| format!("failed to unpack entry at `{}`", entry_path.display()))?;
1105    }
1106
1107    Ok(bytes_written)
1108}
1109
1110/// Workaround for rust-lang/cargo#16237
1111///
1112/// Generated files should have the same deterministic mtime as other files.
1113/// However, since we forgot to set mtime for those files when uploading, they
1114/// always have older mtime (1973-11-29) that prevents zip from packing (requiring >1980)
1115///
1116/// This workaround updates mtime after we unpack the tarball at the destination.
1117fn update_mtime_for_generated_files(pkg_root: &Path) {
1118    const GENERATED_FILES: &[&str] = &["Cargo.lock", "Cargo.toml", ".cargo_vcs_info.json"];
1119    // Hardcoded value be removed once alexcrichton/tar-rs#420 is merged and released.
1120    // See also rust-lang/cargo#16237
1121    const DETERMINISTIC_TIMESTAMP: i64 = 1153704088;
1122
1123    for file in GENERATED_FILES {
1124        let path = pkg_root.join(file);
1125        let mtime = filetime::FileTime::from_unix_time(DETERMINISTIC_TIMESTAMP, 0);
1126        if let Err(e) = filetime::set_file_mtime(&path, mtime) {
1127            tracing::trace!("failed to set deterministic mtime for {path:?}: {e}");
1128        }
1129    }
1130}