diff options
| author | Johannes Schindelin <johannes.schindelin@gmx.de> | 2023-02-06 09:24:06 +0100 |
|---|---|---|
| committer | Johannes Schindelin <johannes.schindelin@gmx.de> | 2023-02-06 09:24:06 +0100 |
| commit | e14d6b8408a2a283e55ca64d2c77ac929ec77204 (patch) | |
| tree | 87fdd060e84cdaaf757d51427010d431b56ab1fd /t/t5604-clone-reference.sh | |
| parent | Sync with maint-2.30 (diff) | |
| parent | Git 2.30.8 (diff) | |
| download | git-e14d6b8408a2a283e55ca64d2c77ac929ec77204.tar.gz git-e14d6b8408a2a283e55ca64d2c77ac929ec77204.zip | |
Sync with 2.30.8
* maint-2.30:
Git 2.30.8
apply: fix writing behind newly created symbolic links
dir-iterator: prevent top-level symlinks without FOLLOW_SYMLINKS
clone: delay picking a transport until after get_repo_path()
t5619: demonstrate clone_local() with ambiguous transport
Diffstat (limited to 't/t5604-clone-reference.sh')
| -rwxr-xr-x | t/t5604-clone-reference.sh | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/t/t5604-clone-reference.sh b/t/t5604-clone-reference.sh index 6fb7a6e7a0..574d8c4147 100755 --- a/t/t5604-clone-reference.sh +++ b/t/t5604-clone-reference.sh @@ -344,4 +344,20 @@ test_expect_success SYMLINKS 'clone repo with symlinked or unknown files at obje test_must_be_empty T--shared.objects-symlinks.raw ' +test_expect_success SYMLINKS 'clone repo with symlinked objects directory' ' + test_when_finished "rm -fr sensitive malicious" && + + mkdir -p sensitive && + echo "secret" >sensitive/file && + + git init malicious && + rm -fr malicious/.git/objects && + ln -s "$(pwd)/sensitive" ./malicious/.git/objects && + + test_must_fail git clone --local malicious clone 2>err && + + test_path_is_missing clone && + grep "failed to start iterator over" err +' + test_done |
