Skip to content

Conversation

@joost-j
Copy link
Contributor

@joost-j joost-j commented Aug 12, 2025

Fixes an issue where a .tar output file would contain inconsistencies with regards to expected and actual file size of the included files.

In some cases, a file on disk can report a size of X bytes, but at the time of actually reading X bytes from the file, less than X bytes are actually available in the file (a short read). Acquire would report these issues as OSError in the resulting Acquisition log file, because the Python stdlib tarfile.py handles it that way. Data may however already be written to the destination archive at that point.

Afterwards, Acquire continues to add new files to the archive. When trying to untar the file using tar -xvf <FILE> this would show as a tar: Skipping to next header error and finally, the process exists with a nonzero exit code.

Included a test case which simulates a file that actually returns less bytes than its reported size, to test this case.

@codecov
Copy link

codecov bot commented Aug 12, 2025

Codecov Report

❌ Patch coverage is 79.41176% with 7 lines in your changes missing coverage. Please review.
✅ Project coverage is 45.20%. Comparing base (c243af8) to head (00a211c).
⚠️ Report is 2 commits behind head on main.

Files with missing lines Patch % Lines
acquire/outputs/tar.py 79.41% 7 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main     #261      +/-   ##
==========================================
+ Coverage   44.93%   45.20%   +0.26%     
==========================================
  Files          26       26              
  Lines        3527     3568      +41     
==========================================
+ Hits         1585     1613      +28     
- Misses       1942     1955      +13     
Flag Coverage Δ
unittests 45.20% <79.41%> (+0.26%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@joost-j joost-j requested a review from Schamper August 12, 2025 14:39
@joost-j joost-j force-pushed the bugfix/pad-shrunk-file-in-tar-output branch from 57a9c5b to 5b22f2c Compare August 13, 2025 11:40
Comment on lines +123 to +125
if info.size is None:
shutil.copyfileobj(fh, self.tar.fileobj, bufsize)
return
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can remove this block since it would be an illegal action in this context.

for _ in range(blocks):
# Prevents "long reads" because it reads at max bufsize bytes at a time
buf = fh.read(bufsize)
if len(buf) < bufsize:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can generalize this case instead of doing it twice. Keep track of how many bytes you actually wrote (i.e. using .tell() and only pad once.


blocks, remainder = divmod(info.size, bufsize)
for _ in range(blocks):
# Prevents "long reads" because it reads at max bufsize bytes at a time
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Long or short?

self.tar.fileobj.write(buf)

if remainder != 0:
# Prevents "long reads" because it reads at max bufsize bytes at a time
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Long or short?


info = copy.copy(info)

buf = info.tobuf(self.tar.format, self.tar.encoding, self.tar.errors)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You could make this even safer by truncating to the previous offset/tar member end if any exception occurs while writing.

@qmadev
Copy link
Contributor

qmadev commented Sep 9, 2025

Any idea when this is getting fixed? It's affecting me as well. Let me know if there's anything I can do to help!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants