Current File : /home/pacjaorg/public_html/dnpsom/administrator/components/com_joomlaupdate/extract.php |
<?php
/**
* @package Joomla.Administrator
* @subpackage com_joomlaupdate
*
* @copyright (C) 2021 Open Source Matters, Inc. <https://www.joomla.org>
* @license GNU General Public License version 2 or later; see LICENSE.txt
*/
/**
* Should you want to debug this file, please add a new line ABOVE this comment with the following
* contents (excluding the space star space at the start of this line):
*
* define('_JOOMLA_UPDATE_DEBUG', 1);
*
* This will do two things:
* - it will create the joomla_update.txt file in your site's temporary directory (default: tmp).
* This file contains a debug log, detailing everything extract.php is doing during the extraction
* of the Joomla update ZIP file.
* - It will prevent extract.php from being overwritten during the update with a new version. This
* is useful if you are testing any changes in extract.php you do not want accidentally
* overwritten, or if you are given a modified extract.php by a Joomla core contributor with
* changes which might fix your update problem.
*/
define('_JOOMLA_UPDATE', 1);
/**
* ZIP archive extraction class
*
* This is a derivative work of Akeeba Restore which is Copyright (c)2008-2021 Nicholas K.
* Dionysopoulos and Akeeba Ltd, distributed under the terms of GNU General Public License version 3
* or later.
*
* The author of the original work has decided to relicense the derivative work under the terms of
* the GNU General Public License version 2 or later and share the copyright of the derivative work
* with Open Source Matters, Inc (OSM), granting OSM non-exclusive rights to this work per the terms
* of the Joomla Contributor Agreement (JCA) the author signed back in 2011 and which is still in
* effect. This is affirmed by the cryptographically signed commits in the Git repository containing
* this file, the copyright messages and this notice here.
*
* @since 4.0.4
*/
class ZIPExtraction
{
/**
* How much data to read at once when processing files
*
* @var int
* @since 4.0.4
*/
private const CHUNK_SIZE = 524288;
/**
* Maximum execution time (seconds).
*
* Each page load will take at most this much time. Please note that if the ZIP archive contains fairly large,
* compressed files we may overshoot this time since we can't interrupt the decompression. This should not be an
* issue in the context of updating Joomla as the ZIP archive contains fairly small files.
*
* If this is too low it will cause too many requests to hit the server, potentially triggering a DoS protection and
* causing the extraction to fail. If this is too big the extraction will not be as verbose and the user might think
* something is broken. A value between 3 and 7 seconds is, therefore, recommended.
*
* @var int
* @since 4.0.4
*/
private const MAX_EXEC_TIME = 4;
/**
* Run-time execution bias (percentage points).
*
* We evaluate the time remaining on the timer before processing each file on the ZIP archive. If we have already
* consumed at least this much percentage of the MAX_EXEC_TIME we will stop processing the archive in this page
* load, return the result to the client and wait for it to call us again so we can resume the extraction.
*
* This becomes important when the MAX_EXEC_TIME is close to the PHP, PHP-FPM or Apache timeout on the server
* (whichever is lowest) and there are fairly large files in the backup archive. If we start extracting a large,
* compressed file close to a hard server timeout it's possible that we will overshoot that hard timeout and see the
* extraction failing.
*
* Since Joomla Update is used to extract a ZIP archive with many small files we can keep at a fairly high 90%
* without much fear that something will break.
*
* Example: if MAX_EXEC_TIME is 10 seconds and RUNTIME_BIAS is 80 each page load will take between 80% and 100% of
* the MAX_EXEC_TIME, i.e. anywhere between 8 and 10 seconds.
*
* Lower values make it less likely to overshoot MAX_EXEC_TIME when extracting large files.
*
* @var int
* @since 4.0.4
*/
private const RUNTIME_BIAS = 90;
/**
* Minimum execution time (seconds).
*
* A request cannot take less than this many seconds. If it does, we add “dead time” (sleep) where the script does
* nothing except wait. This is essentially a rate limiting feature to avoid hitting a server-side DoS protection
* which could be triggered if we ended up sending too many requests in a limited amount of time.
*
* This should normally be less than MAX_EXEC * (RUNTIME_BIAS / 100). Values between that and MAX_EXEC_TIME have the
* effect of almost always adding dead time in each request, unless a really large file is being extracted from the
* ZIP archive. Values larger than MAX_EXEC will always add dead time to the request. This can be useful to
* artificially reduce the CPU usage limit. Some servers might kill the request if they see a sustained CPU usage
* spike over a short period of time.
*
* The chosen value of 3 seconds belongs to the first category, essentially making sure that we have a decent rate
* limiting without annoying the user too much but also catering for the most badly configured of shared
* hosting. It's a happy medium which works for the majority (~90%) of commercial servers out there.
*
* @var int
* @since 4.0.4
*/
private const MIN_EXEC_TIME = 3;
/**
* Internal state when extracting files: we need to be initialised
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_INITIALIZE = -1;
/**
* Internal state when extracting files: no file currently being extracted
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_NOFILE = 0;
/**
* Internal state when extracting files: reading the file header
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_HEADER = 1;
/**
* Internal state when extracting files: reading file data
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_DATA = 2;
/**
* Internal state when extracting files: file data has been read thoroughly
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_DATAREAD = 3;
/**
* Internal state when extracting files: post-processing the file
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_POSTPROC = 4;
/**
* Internal state when extracting files: done with this file
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_DONE = 5;
/**
* Internal state when extracting files: finished extracting the ZIP file
*
* @var int
* @since 4.0.4
*/
private const AK_STATE_FINISHED = 999;
/**
* Internal logging level: debug
*
* @var int
* @since 4.0.4
*/
private const LOG_DEBUG = 1;
/**
* Internal logging level: information
*
* @var int
* @since 4.0.4
*/
private const LOG_INFO = 10;
/**
* Internal logging level: warning
*
* @var int
* @since 4.0.4
*/
private const LOG_WARNING = 50;
/**
* Internal logging level: error
*
* @var int
* @since 4.0.4
*/
private const LOG_ERROR = 90;
/**
* Singleton instance
*
* @var null|self
* @since 4.0.4
*/
private static $instance = null;
/**
* Debug log file pointer resource
*
* @var null|resource|boolean
* @since 4.0.4
*/
private static $logFP = null;
/**
* Debug log filename
*
* @var null|string
* @since 4.0.4
*/
private static $logFilePath = null;
/**
* The total size of the ZIP archive
*
* @var integer
* @since 4.0.4
*/
public $totalSize = 0;
/**
* Which files to skip
*
* @var array
* @since 4.0.4
*/
public $skipFiles = [];
/**
* Current tally of compressed size read
*
* @var integer
* @since 4.0.4
*/
public $compressedTotal = 0;
/**
* Current tally of bytes written to disk
*
* @var integer
* @since 4.0.4
*/
public $uncompressedTotal = 0;
/**
* Current tally of files extracted
*
* @var integer
* @since 4.0.4
*/
public $filesProcessed = 0;
/**
* Maximum execution time allowance per step
*
* @var integer
* @since 4.0.4
*/
private $maxExecTime = null;
/**
* Timestamp of execution start
*
* @var integer
* @since 4.0.4
*/
private $startTime;
/**
* The last error message
*
* @var string|null
* @since 4.0.4
*/
private $lastErrorMessage = null;
/**
* Archive filename
*
* @var string
* @since 4.0.4
*/
private $filename = null;
/**
* Current archive part number
*
* @var boolean
* @since 4.0.4
*/
private $archiveFileIsBeingRead = false;
/**
* The offset inside the current part
*
* @var integer
* @since 4.0.4
*/
private $currentOffset = 0;
/**
* Absolute path to prepend to extracted files
*
* @var string
* @since 4.0.4
*/
private $addPath = '';
/**
* File pointer to the current archive part file
*
* @var resource|null
* @since 4.0.4
*/
private $fp = null;
/**
* Run state when processing the current archive file
*
* @var integer
* @since 4.0.4
*/
private $runState = self::AK_STATE_INITIALIZE;
/**
* File header data, as read by the readFileHeader() method
*
* @var stdClass
* @since 4.0.4
*/
private $fileHeader = null;
/**
* How much of the uncompressed data we've read so far
*
* @var integer
* @since 4.0.4
*/
private $dataReadLength = 0;
/**
* Unwritable files in these directories are always ignored and do not cause errors when not
* extracted.
*
* @var array
* @since 4.0.4
*/
private $ignoreDirectories = [];
/**
* Internal flag, set when the ZIP file has a data descriptor (which we will be ignoring)
*
* @var boolean
* @since 4.0.4
*/
private $expectDataDescriptor = false;
/**
* The UNIX last modification timestamp of the file last extracted
*
* @var integer
* @since 4.0.4
*/
private $lastExtractedFileTimestamp = 0;
/**
* The file path of the file last extracted
*
* @var string
* @since 4.0.4
*/
private $lastExtractedFilename = null;
/**
* Public constructor.
*
* Sets up the internal timer.
*
* @since 4.0.4
*/
public function __construct()
{
$this->setupMaxExecTime();
// Initialize start time
$this->startTime = microtime(true);
}
/**
* Singleton implementation.
*
* @return static
* @since 4.0.4
*/
public static function getInstance(): self
{
if (is_null(self::$instance))
{
self::$instance = new self;
}
return self::$instance;
}
/**
* Returns a serialised copy of the object.
*
* This is different to calling serialise() directly. This operates on a copy of the object which undergoes a
* call to shutdown() first so any open files are closed first.
*
* @return string The serialised data, potentially base64 encoded.
* @since 4.0.4
*/
public static function getSerialised(): string
{
$clone = clone self::getInstance();
$clone->shutdown();
$serialized = serialize($clone);
return (function_exists('base64_encode') && function_exists('base64_decode')) ? base64_encode($serialized) : $serialized;
}
/**
* Restores a serialised instance into the singleton implementation and returns it.
*
* If the serialised data is corrupt it will return null.
*
* @param string $serialised The serialised data, potentially base64 encoded, to deserialize.
*
* @return static|null The instance of the object, NULL if it cannot be deserialised.
* @since 4.0.4
*/
public static function unserialiseInstance(string $serialised): ?self
{
if (function_exists('base64_encode') && function_exists('base64_decode'))
{
$serialised = base64_decode($serialised);
}
$instance = @unserialize($serialised, [
'allowed_classes' => [
self::class,
stdClass::class,
],
]
);
if (($instance === false) || !is_object($instance) || !($instance instanceof self))
{
return null;
}
self::$instance = $instance;
return self::$instance;
}
/**
* Wakeup function, called whenever the class is deserialized.
*
* This method does the following:
* - Restart the timer.
* - Reopen the archive file, if one is defined.
* - Seek to the correct offset of the file.
*
* @return void
* @since 4.0.4
* @internal
*/
public function __wakeup(): void
{
// Reset the timer when deserializing the object.
$this->startTime = microtime(true);
if (!$this->archiveFileIsBeingRead)
{
return;
}
$this->fp = @fopen($this->filename, 'rb');
if ((is_resource($this->fp)) && ($this->currentOffset > 0))
{
@fseek($this->fp, $this->currentOffset);
}
}
/**
* Enforce the minimum execution time.
*
* @return void
* @since 4.0.4
*/
public function enforceMinimumExecutionTime()
{
$elapsed = $this->getRunningTime() * 1000;
$minExecTime = 1000.0 * min(1, (min(self::MIN_EXEC_TIME, $this->getPhpMaxExecTime()) - 1));
// Only run a sleep delay if we haven't reached the minimum execution time
if (($minExecTime <= $elapsed) || ($elapsed <= 0))
{
return;
}
$sleepMillisec = $minExecTime - $elapsed;
/**
* If we need to sleep for more than 1 second we should be using sleep() or time_sleep_until() to prevent high
* CPU usage, also because some OS might not support sleeping for over 1 second using these functions. In all
* other cases we will try to use usleep or time_nanosleep instead.
*/
$longSleep = $sleepMillisec > 1000;
$miniSleepSupported = function_exists('usleep') || function_exists('time_nanosleep');
if (!$longSleep && $miniSleepSupported)
{
if (function_exists('usleep') && ($sleepMillisec < 1000))
{
usleep(1000 * $sleepMillisec);
return;
}
if (function_exists('time_nanosleep') && ($sleepMillisec < 1000))
{
time_nanosleep(0, 1000000 * $sleepMillisec);
return;
}
}
if (function_exists('sleep'))
{
sleep(ceil($sleepMillisec / 1000));
return;
}
if (function_exists('time_sleep_until'))
{
time_sleep_until(time() + ceil($sleepMillisec / 1000));
}
}
/**
* Set the filepath to the ZIP archive which will be extracted.
*
* @param string $value The filepath to the archive. Only LOCAL files are allowed!
*
* @return void
* @since 4.0.4
*/
public function setFilename(string $value)
{
// Security check: disallow remote filenames
if (!empty($value) && strpos($value, '://') !== false)
{
$this->setError('Invalid archive location');
return;
}
$this->filename = $value;
$this->initializeLog(dirname($this->filename));
}
/**
* Sets the path to prefix all extracted files with. Essentially, where the archive will be extracted to.
*
* @param string $addPath The path where the archive will be extracted.
*
* @return void
* @since 4.0.4
*/
public function setAddPath(string $addPath): void
{
$this->addPath = $addPath;
$this->addPath = str_replace('\\', '/', $this->addPath);
$this->addPath = rtrim($this->addPath, '/');
if (!empty($this->addPath))
{
$this->addPath .= '/';
}
}
/**
* Set the list of files to skip when extracting the ZIP file.
*
* @param array $skipFiles A list of files to skip when extracting the ZIP archive
*
* @return void
* @since 4.0.4
*/
public function setSkipFiles(array $skipFiles): void
{
$this->skipFiles = array_values($skipFiles);
}
/**
* Set the directories to skip over when extracting the ZIP archive
*
* @param array $ignoreDirectories The list of directories to ignore.
*
* @return void
* @since 4.0.4
*/
public function setIgnoreDirectories(array $ignoreDirectories): void
{
$this->ignoreDirectories = array_values($ignoreDirectories);
}
/**
* Prepares for the archive extraction
*
* @return void
* @since 4.0.4
*/
public function initialize(): void
{
$this->debugMsg(sprintf('Initializing extraction. Filepath: %s', $this->filename));
$this->totalSize = @filesize($this->filename) ?: 0;
$this->archiveFileIsBeingRead = false;
$this->currentOffset = 0;
$this->runState = self::AK_STATE_NOFILE;
$this->readArchiveHeader();
if (!empty($this->getError()))
{
$this->debugMsg(sprintf('Error: %s', $this->getError()), self::LOG_ERROR);
return;
}
$this->archiveFileIsBeingRead = true;
$this->runState = self::AK_STATE_NOFILE;
$this->debugMsg('Setting state to NOFILE', self::LOG_DEBUG);
}
/**
* Executes a step of the archive extraction
*
* @return boolean True if we are done extracting or an error occurred
* @since 4.0.4
*/
public function step(): bool
{
$status = true;
$this->debugMsg('Starting a new step', self::LOG_INFO);
while ($status && ($this->getTimeLeft() > 0))
{
switch ($this->runState)
{
case self::AK_STATE_INITIALIZE:
$this->debugMsg('Current run state: INITIALIZE', self::LOG_DEBUG);
$this->initialize();
break;
case self::AK_STATE_NOFILE:
$this->debugMsg('Current run state: NOFILE', self::LOG_DEBUG);
$status = $this->readFileHeader();
if ($status)
{
$this->debugMsg('Found file header; updating number of files processed and bytes in/out', self::LOG_DEBUG);
// Update running tallies when we start extracting a file
$this->filesProcessed++;
$this->compressedTotal += array_key_exists('compressed', get_object_vars($this->fileHeader))
? $this->fileHeader->compressed : 0;
$this->uncompressedTotal += $this->fileHeader->uncompressed;
}
break;
case self::AK_STATE_HEADER:
case self::AK_STATE_DATA:
$runStateHuman = $this->runState === self::AK_STATE_HEADER ? 'HEADER' : 'DATA';
$this->debugMsg(sprintf('Current run state: %s', $runStateHuman), self::LOG_DEBUG);
$status = $this->processFileData();
break;
case self::AK_STATE_DATAREAD:
case self::AK_STATE_POSTPROC:
$runStateHuman = $this->runState === self::AK_STATE_DATAREAD ? 'DATAREAD' : 'POSTPROC';
$this->debugMsg(sprintf('Current run state: %s', $runStateHuman), self::LOG_DEBUG);
$this->setLastExtractedFileTimestamp($this->fileHeader->timestamp);
$this->processLastExtractedFile();
$status = true;
$this->runState = self::AK_STATE_DONE;
break;
case self::AK_STATE_DONE:
default:
$this->debugMsg('Current run state: DONE', self::LOG_DEBUG);
$this->runState = self::AK_STATE_NOFILE;
break;
case self::AK_STATE_FINISHED:
$this->debugMsg('Current run state: FINISHED', self::LOG_DEBUG);
$status = false;
break;
}
if ($this->getTimeLeft() <= 0)
{
$this->debugMsg('Ran out of time; the step will break.');
}
elseif (!$status)
{
$this->debugMsg('Last step status is false; the step will break.');
}
}
$error = $this->getError() ?? null;
if (!empty($error))
{
$this->debugMsg(sprintf('Step failed with error: %s', $error), self::LOG_ERROR);
}
// Did we just finish or run into an error?
if (!empty($error) || $this->runState === self::AK_STATE_FINISHED)
{
$this->debugMsg('Returning true (must stop running) from step()', self::LOG_DEBUG);
// Reset internal state, prevents __wakeup from trying to open a non-existent file
$this->archiveFileIsBeingRead = false;
return true;
}
$this->debugMsg('Returning false (must continue running) from step()', self::LOG_DEBUG);
return false;
}
/**
* Get the most recent error message
*
* @return string|null The message string, null if there's no error
* @since 4.0.4
*/
public function getError(): ?string
{
return $this->lastErrorMessage;
}
/**
* Gets the number of seconds left, before we hit the "must break" threshold
*
* @return float
* @since 4.0.4
*/
private function getTimeLeft(): float
{
return $this->maxExecTime - $this->getRunningTime();
}
/**
* Gets the time elapsed since object creation/unserialization, effectively how
* long Akeeba Engine has been processing data
*
* @return float
* @since 4.0.4
*/
private function getRunningTime(): float
{
return microtime(true) - $this->startTime;
}
/**
* Process the last extracted file or directory
*
* This invalidates OPcache for .php files. Also applies the correct permissions and timestamp.
*
* @return void
* @since 4.0.4
*/
private function processLastExtractedFile(): void
{
$this->debugMsg(sprintf('Processing last extracted entity: %s', $this->lastExtractedFilename), self::LOG_DEBUG);
if (@is_file($this->lastExtractedFilename))
{
@chmod($this->lastExtractedFilename, 0644);
clearFileInOPCache($this->lastExtractedFilename);
}
else
{
@chmod($this->lastExtractedFilename, 0755);
}
if ($this->lastExtractedFileTimestamp > 0)
{
@touch($this->lastExtractedFilename, $this->lastExtractedFileTimestamp);
}
}
/**
* Set the last extracted filename
*
* @param string|null $lastExtractedFilename The last extracted filename
*
* @return void
* @since 4.0.4
*/
private function setLastExtractedFilename(?string $lastExtractedFilename): void
{
$this->lastExtractedFilename = $lastExtractedFilename;
}
/**
* Set the last modification UNIX timestamp for the last extracted file
*
* @param int $lastExtractedFileTimestamp The timestamp
*
* @return void
* @since 4.0.4
*/
private function setLastExtractedFileTimestamp(int $lastExtractedFileTimestamp): void
{
$this->lastExtractedFileTimestamp = $lastExtractedFileTimestamp;
}
/**
* Sleep function, called whenever the class is serialized
*
* @return void
* @since 4.0.4
* @internal
*/
private function shutdown(): void
{
if (is_resource(self::$logFP))
{
@fclose(self::$logFP);
}
if (!is_resource($this->fp))
{
return;
}
$this->currentOffset = @ftell($this->fp);
@fclose($this->fp);
}
/**
* Unicode-safe binary data length
*
* @param string|null $string The binary data to get the length for
*
* @return integer
* @since 4.0.4
*/
private function binStringLength(?string $string): int
{
if (is_null($string))
{
return 0;
}
if (function_exists('mb_strlen'))
{
return mb_strlen($string, '8bit') ?: 0;
}
return strlen($string) ?: 0;
}
/**
* Add an error message
*
* @param string $error Error message
*
* @return void
* @since 4.0.4
*/
private function setError(string $error): void
{
$this->lastErrorMessage = $error;
}
/**
* Reads data from the archive.
*
* @param resource $fp The file pointer to read data from
* @param int|null $length The volume of data to read, in bytes
*
* @return string The data read from the file
* @since 4.0.4
*/
private function fread($fp, ?int $length = null): string
{
$readLength = (is_numeric($length) && ($length > 0)) ? $length : PHP_INT_MAX;
$data = fread($fp, $readLength);
if ($data === false)
{
$this->debugMsg('No more data could be read from the file', self::LOG_WARNING);
$data = '';
}
return $data;
}
/**
* Read the header of the archive, making sure it's a valid ZIP file.
*
* @return void
* @since 4.0.4
*/
private function readArchiveHeader(): void
{
$this->debugMsg('Reading the archive header.', self::LOG_DEBUG);
// Open the first part
$this->openArchiveFile();
// Fail for unreadable files
if ($this->fp === false)
{
return;
}
// Read the header data.
$sigBinary = fread($this->fp, 4);
$headerData = unpack('Vsig', $sigBinary);
// We only support single part ZIP files
if ($headerData['sig'] != 0x04034b50)
{
$this->setError('The archive file is corrupt: bad header');
return;
}
// Roll back the file pointer
fseek($this->fp, -4, SEEK_CUR);
$this->currentOffset = @ftell($this->fp);
$this->dataReadLength = 0;
}
/**
* Concrete classes must use this method to read the file header
*
* @return boolean True if reading the file was successful, false if an error occurred or we
* reached end of archive.
* @since 4.0.4
*/
private function readFileHeader(): bool
{
$this->debugMsg('Reading the file entry header.', self::LOG_DEBUG);
if (!is_resource($this->fp))
{
$this->setError('The archive is not open for reading.');
return false;
}
// Unexpected end of file
if ($this->isEOF())
{
$this->debugMsg('EOF when reading file header data', self::LOG_WARNING);
$this->setError('The archive is corrupt or truncated');
return false;
}
$this->currentOffset = ftell($this->fp);
if ($this->expectDataDescriptor)
{
$this->debugMsg('Expecting data descriptor (bit 3 of general purpose flag was set).', self::LOG_DEBUG);
/**
* The last file had bit 3 of the general purpose bit flag set. This means that we have a 12 byte data
* descriptor we need to skip. To make things worse, there might also be a 4 byte optional data descriptor
* header (0x08074b50).
*/
$junk = @fread($this->fp, 4);
$junk = unpack('Vsig', $junk);
$readLength = ($junk['sig'] == 0x08074b50) ? 12 : 8;
$junk = @fread($this->fp, $readLength);
// And check for EOF, too
if ($this->isEOF())
{
$this->debugMsg('EOF when reading data descriptor', self::LOG_WARNING);
$this->setError('The archive is corrupt or truncated');
return false;
}
}
// Get and decode Local File Header
$headerBinary = fread($this->fp, 30);
$format = 'Vsig/C2ver/vbitflag/vcompmethod/vlastmodtime/vlastmoddate/Vcrc/Vcompsize/'
. 'Vuncomp/vfnamelen/veflen';
$headerData = unpack($format, $headerBinary);
// Check signature
if (!($headerData['sig'] == 0x04034b50))
{
// The signature is not the one used for files. Is this a central directory record (i.e. we're done)?
if ($headerData['sig'] == 0x02014b50)
{
$this->debugMsg('Found Central Directory header; the extraction is complete', self::LOG_DEBUG);
// End of ZIP file detected. We'll just skip to the end of file...
@fseek($this->fp, 0, SEEK_END);
$this->runState = self::AK_STATE_FINISHED;
return false;
}
$this->setError('The archive file is corrupt or truncated');
return false;
}
// If bit 3 of the bitflag is set, expectDataDescriptor is true
$this->expectDataDescriptor = ($headerData['bitflag'] & 4) == 4;
$this->fileHeader = new stdClass;
$this->fileHeader->timestamp = 0;
// Read the last modified date and time
$lastmodtime = $headerData['lastmodtime'];
$lastmoddate = $headerData['lastmoddate'];
if ($lastmoddate && $lastmodtime)
{
$vHour = ($lastmodtime & 0xF800) >> 11;
$vMInute = ($lastmodtime & 0x07E0) >> 5;
$vSeconds = ($lastmodtime & 0x001F) * 2;
$vYear = (($lastmoddate & 0xFE00) >> 9) + 1980;
$vMonth = ($lastmoddate & 0x01E0) >> 5;
$vDay = $lastmoddate & 0x001F;
$this->fileHeader->timestamp = @mktime($vHour, $vMInute, $vSeconds, $vMonth, $vDay, $vYear);
}
$isBannedFile = false;
$this->fileHeader->compressed = $headerData['compsize'];
$this->fileHeader->uncompressed = $headerData['uncomp'];
$nameFieldLength = $headerData['fnamelen'];
$extraFieldLength = $headerData['eflen'];
// Read filename field
$this->fileHeader->file = fread($this->fp, $nameFieldLength);
// Read extra field if present
if ($extraFieldLength > 0)
{
$extrafield = fread($this->fp, $extraFieldLength);
}
// Decide filetype -- Check for directories
$this->fileHeader->type = 'file';
if (strrpos($this->fileHeader->file, '/') == strlen($this->fileHeader->file) - 1)
{
$this->fileHeader->type = 'dir';
}
// Decide filetype -- Check for symbolic links
if (($headerData['ver1'] == 10) && ($headerData['ver2'] == 3))
{
$this->fileHeader->type = 'link';
}
switch ($headerData['compmethod'])
{
case 0:
$this->fileHeader->compression = 'none';
break;
case 8:
$this->fileHeader->compression = 'gzip';
break;
default:
$messageTemplate = 'This script cannot handle ZIP compression method %d. '
. 'Only 0 (no compression) and 8 (DEFLATE, gzip) can be handled.';
$actualMessage = sprintf($messageTemplate, $headerData['compmethod']);
$this->setError($actualMessage);
return false;
break;
}
// Find hard-coded banned files
if ((basename($this->fileHeader->file) == ".") || (basename($this->fileHeader->file) == ".."))
{
$isBannedFile = true;
}
// Also try to find banned files passed in class configuration
if ((count($this->skipFiles) > 0) && in_array($this->fileHeader->file, $this->skipFiles))
{
$isBannedFile = true;
}
// If we have a banned file, let's skip it
if ($isBannedFile)
{
$debugMessage = sprintf('Current entity (%s) is banned from extraction and will be skipped over.', $this->fileHeader->file);
$this->debugMsg($debugMessage, self::LOG_DEBUG);
// Advance the file pointer, skipping exactly the size of the compressed data
$seekleft = $this->fileHeader->compressed;
while ($seekleft > 0)
{
// Ensure that we can seek past archive part boundaries
$curSize = @filesize($this->filename);
$curPos = @ftell($this->fp);
$canSeek = $curSize - $curPos;
$canSeek = ($canSeek > $seekleft) ? $seekleft : $canSeek;
@fseek($this->fp, $canSeek, SEEK_CUR);
$seekleft -= $canSeek;
if ($seekleft)
{
$this->setError('The archive is corrupt or truncated');
return false;
}
}
$this->currentOffset = @ftell($this->fp);
$this->runState = self::AK_STATE_DONE;
return true;
}
// Last chance to prepend a path to the filename
if (!empty($this->addPath))
{
$this->fileHeader->file = $this->addPath . $this->fileHeader->file;
}
// Get the translated path name
if ($this->fileHeader->type == 'file')
{
$this->fileHeader->realFile = $this->fileHeader->file;
$this->setLastExtractedFilename($this->fileHeader->file);
}
elseif ($this->fileHeader->type == 'dir')
{
$this->fileHeader->timestamp = 0;
$dir = $this->fileHeader->file;
if (!@is_dir($dir))
{
mkdir($dir, 0755, true);
}
$this->setLastExtractedFilename(null);
}
else
{
// Symlink; do not post-process
$this->fileHeader->timestamp = 0;
$this->setLastExtractedFilename(null);
}
$this->createDirectory();
// Header is read
$this->runState = self::AK_STATE_HEADER;
return true;
}
/**
* Creates the directory this file points to
*
* @return void
* @since 4.0.4
*/
private function createDirectory(): void
{
// Do we need to create a directory?
if (empty($this->fileHeader->realFile))
{
$this->fileHeader->realFile = $this->fileHeader->file;
}
$lastSlash = strrpos($this->fileHeader->realFile, '/');
$dirName = substr($this->fileHeader->realFile, 0, $lastSlash);
$perms = 0755;
$ignore = $this->isIgnoredDirectory($dirName);
if (@is_dir($dirName))
{
return;
}
if ((@mkdir($dirName, $perms, true) === false) && (!$ignore))
{
$this->setError(sprintf('Could not create %s folder', $dirName));
}
}
/**
* Concrete classes must use this method to process file data. It must set $runState to self::AK_STATE_DATAREAD when
* it's finished processing the file data.
*
* @return boolean True if processing the file data was successful, false if an error occurred
* @since 4.0.4
*/
private function processFileData(): bool
{
switch ($this->fileHeader->type)
{
case 'dir':
$this->debugMsg('Extracting entity of type Directory', self::LOG_DEBUG);
return $this->processTypeDir();
break;
case 'link':
$this->debugMsg('Extracting entity of type Symbolic Link', self::LOG_DEBUG);
return $this->processTypeLink();
break;
case 'file':
switch ($this->fileHeader->compression)
{
case 'none':
$this->debugMsg('Extracting entity of type File (Stored)', self::LOG_DEBUG);
return $this->processTypeFileUncompressed();
break;
case 'gzip':
case 'bzip2':
$this->debugMsg('Extracting entity of type File (Compressed)', self::LOG_DEBUG);
return $this->processTypeFileCompressed();
break;
case 'default':
$this->setError(sprintf('Unknown compression type %s.', $this->fileHeader->compression));
return false;
break;
}
break;
}
$this->setError(sprintf('Unknown entry type %s.', $this->fileHeader->type));
return false;
}
/**
* Opens the next part file for reading
*
* @return void
* @since 4.0.4
*/
private function openArchiveFile(): void
{
$this->debugMsg('Opening archive file for reading', self::LOG_DEBUG);
if ($this->archiveFileIsBeingRead)
{
return;
}
if (is_resource($this->fp))
{
@fclose($this->fp);
}
$this->fp = @fopen($this->filename, 'rb');
if ($this->fp === false)
{
$message = 'Could not open archive for reading. Check that the file exists, is '
. 'readable by the web server and is not in a directory made out of reach by chroot, '
. 'open_basedir restrictions or any other restriction put in place by your host.';
$this->setError($message);
return;
}
fseek($this->fp, 0);
$this->currentOffset = 0;
}
/**
* Returns true if we have reached the end of file
*
* @return boolean True if we have reached End Of File
* @since 4.0.4
*/
private function isEOF(): bool
{
/**
* feof() will return false if the file pointer is exactly at the last byte of the file. However, this is a
* condition we want to treat as a proper EOF for the purpose of extracting a ZIP file. Hence the second part
* after the logical OR.
*/
return @feof($this->fp) || (@ftell($this->fp) > @filesize($this->filename));
}
/**
* Handles the permissions of the parent directory to a file and the file itself to make it writeable.
*
* @param string $path A path to a file
*
* @return void
* @since 4.0.4
*/
private function setCorrectPermissions(string $path): void
{
static $rootDir = null;
if (is_null($rootDir))
{
$rootDir = rtrim($this->addPath, '/\\');
}
$directory = rtrim(dirname($path), '/\\');
// Is this an unwritable directory?
if (($directory != $rootDir) && !is_writeable($directory))
{
@chmod($directory, 0755);
}
@chmod($path, 0644);
}
/**
* Is this file or directory contained in a directory we've decided to ignore
* write errors for? This is useful to let the extraction work despite write
* errors in the log, logs and tmp directories which MIGHT be used by the system
* on some low quality hosts and Plesk-powered hosts.
*
* @param string $shortFilename The relative path of the file/directory in the package
*
* @return boolean True if it belongs in an ignored directory
* @since 4.0.4
*/
private function isIgnoredDirectory(string $shortFilename): bool
{
$check = substr($shortFilename, -1) == '/' ? rtrim($shortFilename, '/') : dirname($shortFilename);
return in_array($check, $this->ignoreDirectories);
}
/**
* Process the file data of a directory entry
*
* @return boolean
* @since 4.0.4
*/
private function processTypeDir(): bool
{
// Directory entries do not have file data, therefore we're done processing the entry.
$this->runState = self::AK_STATE_DATAREAD;
return true;
}
/**
* Process the file data of a link entry
*
* @return boolean
* @since 4.0.4
*/
private function processTypeLink(): bool
{
$toReadBytes = 0;
$leftBytes = $this->fileHeader->compressed;
$data = '';
while ($leftBytes > 0)
{
$toReadBytes = min($leftBytes, self::CHUNK_SIZE);
$mydata = $this->fread($this->fp, $toReadBytes);
$reallyReadBytes = $this->binStringLength($mydata);
$data .= $mydata;
$leftBytes -= $reallyReadBytes;
if ($reallyReadBytes < $toReadBytes)
{
// We read less than requested!
if ($this->isEOF())
{
$this->debugMsg('EOF when reading symlink data', self::LOG_WARNING);
$this->setError('The archive file is corrupt or truncated');
return false;
}
}
}
$filename = $this->fileHeader->realFile ?? $this->fileHeader->file;
// Try to remove an existing file or directory by the same name
if (file_exists($filename))
{
clearFileInOPCache($filename);
@unlink($filename);
@rmdir($filename);
}
// Remove any trailing slash
if (substr($filename, -1) == '/')
{
$filename = substr($filename, 0, -1);
}
// Create the symlink
@symlink($data, $filename);
$this->runState = self::AK_STATE_DATAREAD;
// No matter if the link was created!
return true;
}
/**
* Processes an uncompressed (stored) file
*
* @return boolean
* @since 4.0.4
*/
private function processTypeFileUncompressed(): bool
{
// Uncompressed files are being processed in small chunks, to avoid timeouts
if ($this->dataReadLength == 0)
{
// Before processing file data, ensure permissions are adequate
$this->setCorrectPermissions($this->fileHeader->file);
}
// Open the output file
$ignore = $this->isIgnoredDirectory($this->fileHeader->file);
$writeMode = ($this->dataReadLength == 0) ? 'wb' : 'ab';
$outfp = @fopen($this->fileHeader->realFile, $writeMode);
// Can we write to the file?
if (($outfp === false) && (!$ignore))
{
// An error occurred
$this->setError(sprintf('Could not open %s for writing.', $this->fileHeader->realFile));
return false;
}
// Does the file have any data, at all?
if ($this->fileHeader->compressed == 0)
{
// No file data!
if (is_resource($outfp))
{
@fclose($outfp);
}
$this->debugMsg('Zero byte Stored file; no data will be read', self::LOG_DEBUG);
$this->runState = self::AK_STATE_DATAREAD;
return true;
}
$leftBytes = $this->fileHeader->compressed - $this->dataReadLength;
// Loop while there's data to read and enough time to do it
while (($leftBytes > 0) && ($this->getTimeLeft() > 0))
{
$toReadBytes = min($leftBytes, self::CHUNK_SIZE);
$data = $this->fread($this->fp, $toReadBytes);
$reallyReadBytes = $this->binStringLength($data);
$leftBytes -= $reallyReadBytes;
$this->dataReadLength += $reallyReadBytes;
if ($reallyReadBytes < $toReadBytes)
{
// We read less than requested! Why? Did we hit local EOF?
if ($this->isEOF())
{
// Nope. The archive is corrupt
$this->debugMsg('EOF when reading stored file data', self::LOG_WARNING);
$this->setError('The archive file is corrupt or truncated');
return false;
}
}
if (is_resource($outfp))
{
@fwrite($outfp, $data);
}
if ($this->getTimeLeft())
{
$this->debugMsg('Out of time; will resume extraction in the next step', self::LOG_DEBUG);
}
}
// Close the file pointer
if (is_resource($outfp))
{
@fclose($outfp);
}
// Was this a pre-timeout bail out?
if ($leftBytes > 0)
{
$this->debugMsg(sprintf('We have %d bytes left to extract in the next step', $leftBytes), self::LOG_DEBUG);
$this->runState = self::AK_STATE_DATA;
return true;
}
// Oh! We just finished!
$this->runState = self::AK_STATE_DATAREAD;
$this->dataReadLength = 0;
return true;
}
/**
* Processes a compressed file
*
* @return boolean
* @since 4.0.4
*/
private function processTypeFileCompressed(): bool
{
// Before processing file data, ensure permissions are adequate
$this->setCorrectPermissions($this->fileHeader->file);
// Open the output file
$outfp = @fopen($this->fileHeader->realFile, 'wb');
// Can we write to the file?
$ignore = $this->isIgnoredDirectory($this->fileHeader->file);
if (($outfp === false) && (!$ignore))
{
// An error occurred
$this->setError(sprintf('Could not open %s for writing.', $this->fileHeader->realFile));
return false;
}
// Does the file have any data, at all?
if ($this->fileHeader->compressed == 0)
{
$this->debugMsg('Zero byte Compressed file; no data will be read', self::LOG_DEBUG);
// No file data!
if (is_resource($outfp))
{
@fclose($outfp);
}
$this->runState = self::AK_STATE_DATAREAD;
return true;
}
// Simple compressed files are processed as a whole; we can't do chunk processing
$zipData = $this->fread($this->fp, $this->fileHeader->compressed);
while ($this->binStringLength($zipData) < $this->fileHeader->compressed)
{
// End of local file before reading all data?
if ($this->isEOF())
{
$this->debugMsg('EOF reading compressed data', self::LOG_WARNING);
$this->setError('The archive file is corrupt or truncated');
return false;
}
}
switch ($this->fileHeader->compression)
{
case 'gzip':
/** @noinspection PhpComposerExtensionStubsInspection */
$unzipData = gzinflate($zipData);
break;
case 'bzip2':
/** @noinspection PhpComposerExtensionStubsInspection */
$unzipData = bzdecompress($zipData);
break;
default:
$this->setError(sprintf('Unknown compression method %s', $this->fileHeader->compression));
return false;
break;
}
unset($zipData);
// Write to the file.
if (is_resource($outfp))
{
@fwrite($outfp, $unzipData, $this->fileHeader->uncompressed);
@fclose($outfp);
}
unset($unzipData);
$this->runState = self::AK_STATE_DATAREAD;
return true;
}
/**
* Set up the maximum execution time
*
* @return void
* @since 4.0.4
*/
private function setupMaxExecTime(): void
{
$configMaxTime = self::MAX_EXEC_TIME;
$bias = self::RUNTIME_BIAS / 100;
$this->maxExecTime = min($this->getPhpMaxExecTime(), $configMaxTime) * $bias;
}
/**
* Get the PHP maximum execution time.
*
* If it's not defined or it's zero (infinite) we use a fake value of 10 seconds.
*
* @return integer
* @since 4.0.4
*/
private function getPhpMaxExecTime(): int
{
if (!@function_exists('ini_get'))
{
return 10;
}
$phpMaxTime = @ini_get("maximum_execution_time");
$phpMaxTime = (!is_numeric($phpMaxTime) ? 10 : @intval($phpMaxTime)) ?: 10;
return max(1, $phpMaxTime);
}
/**
* Write a message to the debug error log
*
* @param string $message The message to log
* @param int $priority The message's log priority
*
* @return void
* @since 4.0.4
*/
private function debugMsg(string $message, int $priority = self::LOG_INFO): void
{
if (!defined('_JOOMLA_UPDATE_DEBUG'))
{
return;
}
if (!is_resource(self::$logFP) && !is_bool(self::$logFP))
{
self::$logFP = @fopen(self::$logFilePath, 'at');
}
if (!is_resource(self::$logFP))
{
return;
}
switch ($priority)
{
case self::LOG_DEBUG:
$priorityString = 'DEBUG';
break;
case self::LOG_INFO:
$priorityString = 'INFO';
break;
case self::LOG_WARNING:
$priorityString = 'WARNING';
break;
case self::LOG_ERROR:
$priorityString = 'ERROR';
break;
}
fputs(self::$logFP, sprintf('%s | %7s | %s' . "\r\n", gmdate('Y-m-d H:i:s'), $priorityString, $message));
}
/**
* Initialise the debug log file
*
* @param string $logPath The path where the log file will be written to
*
* @return void
* @since 4.0.4
*/
private function initializeLog(string $logPath): void
{
if (!defined('_JOOMLA_UPDATE_DEBUG'))
{
return;
}
$logPath = $logPath ?: dirname($this->filename);
$logFile = rtrim($logPath, '/' . DIRECTORY_SEPARATOR) . DIRECTORY_SEPARATOR . 'joomla_update.txt';
self::$logFilePath = $logFile;
}
}
// Skip over the mini-controller for testing purposes
if (defined('_JOOMLA_UPDATE_TESTING'))
{
return;
}
/**
* Invalidate a file in OPcache.
*
* Only applies if the file has a .php extension.
*
* @param string $file The filepath to clear from OPcache
*
* @return boolean
* @since 4.0.4
*/
function clearFileInOPCache(string $file): bool
{
static $hasOpCache = null;
if (is_null($hasOpCache))
{
$hasOpCache = ini_get('opcache.enable')
&& function_exists('opcache_invalidate')
&& (!ini_get('opcache.restrict_api') || stripos(realpath($_SERVER['SCRIPT_FILENAME']), ini_get('opcache.restrict_api')) === 0);
}
if ($hasOpCache && (strtolower(substr($file, -4)) === '.php'))
{
return opcache_invalidate($file, true);
}
return false;
}
/**
* A timing safe equals comparison.
*
* Uses the built-in hash_equals() method if it exists. It SHOULD exist, as it's available since PHP 5.6 whereas even
* Joomla 4.0 requires PHP 7.2 or later. If for any reason the built-in function is not available (for example, a host
* has disabled it because they do not understand the first thing about security) we will fall back to a safe, userland
* implementation.
*
* @param string $known The known value to check against
* @param string $user The user submitted value to check
*
* @return boolean True if the two strings are identical.
* @since 4.0.4
*
* @see http://blog.ircmaxell.com/2014/11/its-all-about-time.html
*/
function timingSafeEquals($known, $user)
{
if (function_exists('hash_equals'))
{
return hash_equals($known, $user);
}
$safeLen = strlen($known);
$userLen = strlen($user);
if ($userLen != $safeLen)
{
return false;
}
$result = 0;
for ($i = 0; $i < $userLen; $i++)
{
$result |= (ord($known[$i]) ^ ord($user[$i]));
}
// They are only identical strings if $result is exactly 0...
return $result === 0;
}
/**
* Gets the configuration parameters from the update.php file and validates the password sent with
* the request.
*
* @return array|null The configuration parameters to use. NULL if this is an invalid request.
* @since 4.0.4
*/
function getConfiguration(): ?array
{
// Make sure the locale is correct for basename() to work
if (function_exists('setlocale'))
{
@setlocale(LC_ALL, 'en_US.UTF8');
}
// Require update.php or fail
$setupFile = __DIR__ . '/update.php';
if (!file_exists($setupFile))
{
return null;
}
/**
* If the setup file was created more than 1.5 hours ago we can assume that it's stale and someone forgot to
* remove it from the server.
*
* This prevents brute force attacks against the randomly generated password. Even a simple 8 character simple
* alphanum (a-z, 0-9) password yields over 2.8e12 permutation. Assuming a very fast server which can
* serve 100 requests to extract.php per second and an easy to attack password requiring going over just 1% of
* the search space it'd still take over 282 million seconds to brute force it. Our limit is more than 4 orders
* of magnitude lower than this best practical case scenario, giving us adequate protection against all but the
* luckiest attacker (spoiler alert: the mathematics of probabilities say you're not gonna get too lucky).
*
* It is still advisable to remove the update.php file once you are done with the extraction. This check
* here is only meant as a failsafe in case of a server error during the extraction and subsequent lack of user
* action to remove the update.php file from their server.
*/
clearstatcache(true);
$setupFileCreationTime = filectime($setupFile);
if (abs(time() - $setupFileCreationTime) > 5400)
{
return null;
}
// Load update.php. It pulls a variable named $restoration_setup into the local scope.
clearFileInOPCache($setupFile);
require_once $setupFile;
/** @var array $extractionSetup */
// The file exists but no configuration is present?
if (empty($extractionSetup ?? null) || !is_array($extractionSetup))
{
return null;
}
/**
* Immediately reject any attempt to run extract.php without a password.
*
* Doing that is a GRAVE SECURITY RISK. It makes it trivial to hack a site. Therefore we are preventing this script
* to run without a password.
*/
$password = $extractionSetup['security.password'] ?? null;
$userPassword = $_REQUEST['password'] ?? '';
$userPassword = !is_string($userPassword) ? '' : trim($userPassword);
if (empty($password) || !is_string($password) || (trim($password) == '') || (strlen(trim($password)) < 32))
{
return null;
}
// Timing-safe password comparison. See http://blog.ircmaxell.com/2014/11/its-all-about-time.html
if (!timingSafeEquals($password, $userPassword))
{
return null;
}
// An "instance" variable will resume the engine from the serialised instance
$serialized = $_REQUEST['instance'] ?? null;
if (!is_null($serialized) && empty(ZIPExtraction::unserialiseInstance($serialized)))
{
// The serialised instance is corrupt or someone tries to trick us. YOU SHALL NOT PASS!
return null;
}
return $extractionSetup;
}
// Import configuration
$retArray = [
'status' => true,
'message' => null,
];
$configuration = getConfiguration();
$enabled = !empty($configuration);
if ($enabled)
{
$sourcePath = $configuration['setup.sourcepath'] ?? '';
$sourceFile = $configuration['setup.sourcefile'] ?? '';
$destDir = ($configuration['setup.destdir'] ?? null) ?: __DIR__;
$basePath = rtrim(str_replace('\\', '/', __DIR__), '/');
$basePath = empty($basePath) ? $basePath : ($basePath . '/');
$sourceFile = (empty($sourcePath) ? '' : (rtrim($sourcePath, '/\\') . '/')) . $sourceFile;
$engine = ZIPExtraction::getInstance();
$engine->setFilename($sourceFile);
$engine->setAddPath($destDir);
$skipFiles = [
'administrator/components/com_joomlaupdate/restoration.php',
'administrator/components/com_joomlaupdate/update.php',
];
if (defined('_JOOMLA_UPDATE_DEBUG'))
{
$skipFiles[] = 'administrator/components/com_joomlaupdate/extract.php';
}
$engine->setSkipFiles($skipFiles
);
$engine->setIgnoreDirectories([
'tmp', 'administrator/logs',
]
);
$task = $_REQUEST['task'] ?? null;
switch ($task)
{
case 'startExtract':
case 'stepExtract':
$done = $engine->step();
$error = $engine->getError();
if ($error != '')
{
$retArray['status'] = false;
$retArray['done'] = true;
$retArray['message'] = $error;
}
elseif ($done)
{
$retArray['files'] = $engine->filesProcessed;
$retArray['bytesIn'] = $engine->compressedTotal;
$retArray['bytesOut'] = $engine->uncompressedTotal;
$retArray['percent'] = 100;
$retArray['status'] = true;
$retArray['done'] = true;
$retArray['percent'] = min($retArray['percent'], 100);
}
else
{
$retArray['files'] = $engine->filesProcessed;
$retArray['bytesIn'] = $engine->compressedTotal;
$retArray['bytesOut'] = $engine->uncompressedTotal;
$retArray['percent'] = ($engine->totalSize > 0) ? (100 * $engine->compressedTotal / $engine->totalSize) : 0;
$retArray['status'] = true;
$retArray['done'] = false;
$retArray['instance'] = ZIPExtraction::getSerialised();
}
$engine->enforceMinimumExecutionTime();
break;
case 'finalizeUpdate':
$root = $configuration['setup.destdir'] ?? '';
// Remove update.php
clearFileInOPCache($basePath . 'update.php');
@unlink($basePath . 'update.php');
// Import a custom finalisation file
$filename = dirname(__FILE__) . '/finalisation.php';
if (file_exists($filename))
{
clearFileInOPCache($filename);
include_once $filename;
}
// Run a custom finalisation script
if (function_exists('finalizeUpdate'))
{
finalizeUpdate($root, $basePath);
}
$engine->enforceMinimumExecutionTime();
break;
default:
// Invalid task!
$enabled = false;
break;
}
}
// This could happen even if $enabled was true, e.g. if we were asked for an invalid task.
if (!$enabled)
{
// Maybe we weren't authorized or the task was invalid?
$retArray['status'] = false;
$retArray['message'] = 'Invalid login';
}
// JSON encode the message
echo json_encode($retArray);