You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
251 lines
6.8 KiB
251 lines
6.8 KiB
#!/bin/sh |
|
|
|
test_description='check handling of .. in submodule names |
|
|
|
Exercise the name-checking function on a variety of names, and then give a |
|
real-world setup that confirms we catch this in practice. |
|
' |
|
. ./test-lib.sh |
|
. "$TEST_DIRECTORY"/lib-pack.sh |
|
|
|
test_expect_success 'check names' ' |
|
cat >expect <<-\EOF && |
|
valid |
|
valid/with/paths |
|
EOF |
|
|
|
git submodule--helper check-name >actual <<-\EOF && |
|
valid |
|
valid/with/paths |
|
|
|
../foo |
|
/../foo |
|
..\foo |
|
\..\foo |
|
foo/.. |
|
foo/../ |
|
foo\.. |
|
foo\..\ |
|
foo/../bar |
|
EOF |
|
|
|
test_cmp expect actual |
|
' |
|
|
|
test_expect_success 'create innocent subrepo' ' |
|
git init innocent && |
|
git -C innocent commit --allow-empty -m foo |
|
' |
|
|
|
test_expect_success 'submodule add refuses invalid names' ' |
|
test_must_fail \ |
|
git submodule add --name ../../modules/evil "$PWD/innocent" evil |
|
' |
|
|
|
test_expect_success 'add evil submodule' ' |
|
git submodule add "$PWD/innocent" evil && |
|
|
|
mkdir modules && |
|
cp -r .git/modules/evil modules && |
|
write_script modules/evil/hooks/post-checkout <<-\EOF && |
|
echo >&2 "RUNNING POST CHECKOUT" |
|
EOF |
|
|
|
git config -f .gitmodules submodule.evil.update checkout && |
|
git config -f .gitmodules --rename-section \ |
|
submodule.evil submodule.../../modules/evil && |
|
git add modules && |
|
git commit -am evil |
|
' |
|
|
|
# This step seems like it shouldn't be necessary, since the payload is |
|
# contained entirely in the evil submodule. But due to the vagaries of the |
|
# submodule code, checking out the evil module will fail unless ".git/modules" |
|
# exists. Adding another submodule (with a name that sorts before "evil") is an |
|
# easy way to make sure this is the case in the victim clone. |
|
test_expect_success 'add other submodule' ' |
|
git submodule add "$PWD/innocent" another-module && |
|
git add another-module && |
|
git commit -am another |
|
' |
|
|
|
test_expect_success 'clone evil superproject' ' |
|
git clone --recurse-submodules . victim >output 2>&1 && |
|
! grep "RUNNING POST CHECKOUT" output |
|
' |
|
|
|
test_expect_success 'fsck detects evil superproject' ' |
|
test_must_fail git fsck |
|
' |
|
|
|
test_expect_success 'transfer.fsckObjects detects evil superproject (unpack)' ' |
|
rm -rf dst.git && |
|
git init --bare dst.git && |
|
git -C dst.git config transfer.fsckObjects true && |
|
test_must_fail git push dst.git HEAD |
|
' |
|
|
|
test_expect_success 'transfer.fsckObjects detects evil superproject (index)' ' |
|
rm -rf dst.git && |
|
git init --bare dst.git && |
|
git -C dst.git config transfer.fsckObjects true && |
|
git -C dst.git config transfer.unpackLimit 1 && |
|
test_must_fail git push dst.git HEAD |
|
' |
|
|
|
# Normally our packs contain commits followed by trees followed by blobs. This |
|
# reverses the order, which requires backtracking to find the context of a |
|
# blob. We'll start with a fresh gitmodules-only tree to make it simpler. |
|
test_expect_success 'create oddly ordered pack' ' |
|
git checkout --orphan odd && |
|
git rm -rf --cached . && |
|
git add .gitmodules && |
|
git commit -m odd && |
|
{ |
|
pack_header 3 && |
|
pack_obj $(git rev-parse HEAD:.gitmodules) && |
|
pack_obj $(git rev-parse HEAD^{tree}) && |
|
pack_obj $(git rev-parse HEAD) |
|
} >odd.pack && |
|
pack_trailer odd.pack |
|
' |
|
|
|
test_expect_success 'transfer.fsckObjects handles odd pack (unpack)' ' |
|
rm -rf dst.git && |
|
git init --bare dst.git && |
|
test_must_fail git -C dst.git unpack-objects --strict <odd.pack |
|
' |
|
|
|
test_expect_success 'transfer.fsckObjects handles odd pack (index)' ' |
|
rm -rf dst.git && |
|
git init --bare dst.git && |
|
test_must_fail git -C dst.git index-pack --strict --stdin <odd.pack |
|
' |
|
|
|
test_expect_success 'index-pack --strict works for non-repo pack' ' |
|
rm -rf dst.git && |
|
git init --bare dst.git && |
|
cp odd.pack dst.git && |
|
test_must_fail git -C dst.git index-pack --strict odd.pack 2>output && |
|
# Make sure we fail due to bad gitmodules content, not because we |
|
# could not read the blob in the first place. |
|
grep gitmodulesName output |
|
' |
|
|
|
test_expect_success 'fsck detects symlinked .gitmodules file' ' |
|
git init symlink && |
|
( |
|
cd symlink && |
|
|
|
# Make the tree directly to avoid index restrictions. |
|
# |
|
# Because symlinks store the target as a blob, choose |
|
# a pathname that could be parsed as a .gitmodules file |
|
# to trick naive non-symlink-aware checking. |
|
tricky="[foo]bar=true" && |
|
content=$(git hash-object -w ../.gitmodules) && |
|
target=$(printf "$tricky" | git hash-object -w --stdin) && |
|
{ |
|
printf "100644 blob $content\t$tricky\n" && |
|
printf "120000 blob $target\t.gitmodules\n" |
|
} | git mktree && |
|
|
|
# Check not only that we fail, but that it is due to the |
|
# symlink detector; this grep string comes from the config |
|
# variable name and will not be translated. |
|
test_must_fail git fsck 2>output && |
|
test_i18ngrep gitmodulesSymlink output |
|
) |
|
' |
|
|
|
test_expect_success 'fsck detects non-blob .gitmodules' ' |
|
git init non-blob && |
|
( |
|
cd non-blob && |
|
|
|
# As above, make the funny tree directly to avoid index |
|
# restrictions. |
|
mkdir subdir && |
|
cp ../.gitmodules subdir/file && |
|
git add subdir/file && |
|
git commit -m ok && |
|
git ls-tree HEAD | sed s/subdir/.gitmodules/ | git mktree && |
|
|
|
test_must_fail git fsck 2>output && |
|
test_i18ngrep gitmodulesBlob output |
|
) |
|
' |
|
|
|
test_expect_success 'fsck detects corrupt .gitmodules' ' |
|
git init corrupt && |
|
( |
|
cd corrupt && |
|
|
|
echo "[broken" >.gitmodules && |
|
git add .gitmodules && |
|
git commit -m "broken gitmodules" && |
|
|
|
git fsck 2>output && |
|
test_i18ngrep gitmodulesParse output && |
|
test_i18ngrep ! "bad config" output |
|
) |
|
' |
|
|
|
test_expect_success MINGW 'prevent git~1 squatting on Windows' ' |
|
git init squatting && |
|
( |
|
cd squatting && |
|
mkdir a && |
|
touch a/..git && |
|
git add a/..git && |
|
test_tick && |
|
git commit -m initial && |
|
|
|
modules="$(test_write_lines \ |
|
"[submodule \"b.\"]" "url = ." "path = c" \ |
|
"[submodule \"b\"]" "url = ." "path = d\\\\a" | |
|
git hash-object -w --stdin)" && |
|
rev="$(git rev-parse --verify HEAD)" && |
|
hash="$(echo x | git hash-object -w --stdin)" && |
|
test_must_fail git update-index --add \ |
|
--cacheinfo 160000,$rev,d\\a 2>err && |
|
test_i18ngrep "Invalid path" err && |
|
git -c core.protectNTFS=false update-index --add \ |
|
--cacheinfo 100644,$modules,.gitmodules \ |
|
--cacheinfo 160000,$rev,c \ |
|
--cacheinfo 160000,$rev,d\\a \ |
|
--cacheinfo 100644,$hash,d./a/x \ |
|
--cacheinfo 100644,$hash,d./a/..git && |
|
test_tick && |
|
git -c core.protectNTFS=false commit -m "module" |
|
) && |
|
test_must_fail git -c core.protectNTFS=false \ |
|
clone --recurse-submodules squatting squatting-clone 2>err && |
|
test_i18ngrep -e "directory not empty" -e "not an empty directory" err && |
|
! grep gitdir squatting-clone/d/a/git~2 |
|
' |
|
|
|
test_expect_success 'git dirs of sibling submodules must not be nested' ' |
|
git init nested && |
|
test_commit -C nested nested && |
|
( |
|
cd nested && |
|
cat >.gitmodules <<-EOF && |
|
[submodule "hippo"] |
|
url = . |
|
path = thing1 |
|
[submodule "hippo/hooks"] |
|
url = . |
|
path = thing2 |
|
EOF |
|
git clone . thing1 && |
|
git clone . thing2 && |
|
git add .gitmodules thing1 thing2 && |
|
test_tick && |
|
git commit -m nested |
|
) && |
|
test_must_fail git clone --recurse-submodules nested clone 2>err && |
|
test_i18ngrep "is inside git dir" err |
|
' |
|
|
|
test_done
|
|
|