diff options
author | Santos Gallegos <stsewd@proton.me> | 2022-12-27 18:22:58 -0500 |
---|---|---|
committer | Santos Gallegos <stsewd@proton.me> | 2022-12-27 18:22:58 -0500 |
commit | b92f01a3a38fc8e171d08575c69de9733811faa6 (patch) | |
tree | e2b267602c818e0b9b954f665f0dc04bf79c6c20 /test/test_repo.py | |
parent | fd2c6da5f82009398d241dc07603fbcd490ced29 (diff) | |
download | gitpython-b92f01a3a38fc8e171d08575c69de9733811faa6.tar.gz |
Update/add tests for Repo.clone*
Diffstat (limited to 'test/test_repo.py')
-rw-r--r-- | test/test_repo.py | 148 |
1 files changed, 121 insertions, 27 deletions
diff --git a/test/test_repo.py b/test/test_repo.py index a937836f..72320184 100644 --- a/test/test_repo.py +++ b/test/test_repo.py @@ -13,7 +13,6 @@ import pathlib import pickle import sys import tempfile -import uuid from unittest import mock, skipIf, SkipTest import pytest @@ -226,6 +225,7 @@ class TestRepo(TestBase): "--config submodule.repo.update=checkout", "--config filter.lfs.clean='git-lfs clean -- %f'", ], + allow_unsafe_options=True, ) self.assertEqual(cloned.config_reader().get_value("submodule", "active"), "repo") @@ -266,39 +266,133 @@ class TestRepo(TestBase): to_path=rw_dir, ) - def test_unsafe_options(self): - self.assertFalse(Repo.unsafe_options("github.com/deploy/deploy")) + @with_rw_repo("HEAD") + def test_clone_unsafe_options(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + tmp_file = tmp_dir / "pwn" + unsafe_options = [ + f"--upload-pack='touch {tmp_file}'", + f"-u 'touch {tmp_file}'", + "--config=protocol.ext.allow=always", + "-c protocol.ext.allow=always", + ] + for unsafe_option in unsafe_options: + with self.assertRaises(UnsafeOptionError): + rw_repo.clone(tmp_dir, multi_options=[unsafe_option]) - def test_unsafe_options_ext_url(self): - self.assertTrue(Repo.unsafe_options("ext::ssh")) + @with_rw_repo("HEAD") + def test_clone_unsafe_options_allowed(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + tmp_file = tmp_dir / "pwn" + unsafe_options = [ + f"--upload-pack='touch {tmp_file}'", + f"-u 'touch {tmp_file}'", + ] + for i, unsafe_option in enumerate(unsafe_options): + destination = tmp_dir / str(i) + # The options will be allowed, but the command will fail. + with self.assertRaises(GitCommandError): + rw_repo.clone(destination, multi_options=[unsafe_option], allow_unsafe_options=True) + + unsafe_options = [ + "--config=protocol.ext.allow=always", + "-c protocol.ext.allow=always", + ] + for i, unsafe_option in enumerate(unsafe_options): + destination = tmp_dir / str(i) + assert not destination.exists() + rw_repo.clone(destination, multi_options=[unsafe_option], allow_unsafe_options=True) + assert destination.exists() - def test_unsafe_options_multi_options_upload_pack(self): - self.assertTrue(Repo.unsafe_options("", ["--upload-pack='touch foo'"])) + @with_rw_repo("HEAD") + def test_clone_safe_options(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + options = [ + "--depth=1", + "--single-branch", + "-q", + ] + for option in options: + destination = tmp_dir / option + assert not destination.exists() + rw_repo.clone(destination, multi_options=[option]) + assert destination.exists() - def test_unsafe_options_multi_options_config_user(self): - self.assertFalse(Repo.unsafe_options("", ["--config user"])) + @with_rw_repo("HEAD") + def test_clone_from_unsafe_options(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + tmp_file = tmp_dir / "pwn" + unsafe_options = [ + f"--upload-pack='touch {tmp_file}'", + f"-u 'touch {tmp_file}'", + "--config=protocol.ext.allow=always", + "-c protocol.ext.allow=always", + ] + for unsafe_option in unsafe_options: + with self.assertRaises(UnsafeOptionError): + Repo.clone_from(rw_repo.working_dir, tmp_dir, multi_options=[unsafe_option]) - def test_unsafe_options_multi_options_config_protocol(self): - self.assertTrue(Repo.unsafe_options("", ["--config protocol.foo"])) + @with_rw_repo("HEAD") + def test_clone_from_unsafe_options_allowed(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + tmp_file = tmp_dir / "pwn" + unsafe_options = [ + f"--upload-pack='touch {tmp_file}'", + f"-u 'touch {tmp_file}'", + ] + for i, unsafe_option in enumerate(unsafe_options): + destination = tmp_dir / str(i) + # The options will be allowed, but the command will fail. + with self.assertRaises(GitCommandError): + Repo.clone_from( + rw_repo.working_dir, destination, multi_options=[unsafe_option], allow_unsafe_options=True + ) - def test_clone_from_forbids_helper_urls_by_default(self): - with self.assertRaises(UnsafeOptionError): - Repo.clone_from("ext::sh -c touch% /tmp/foo", "tmp") + unsafe_options = [ + "--config=protocol.ext.allow=always", + "-c protocol.ext.allow=always", + ] + for i, unsafe_option in enumerate(unsafe_options): + destination = tmp_dir / str(i) + assert not destination.exists() + Repo.clone_from(rw_repo.working_dir, destination, multi_options=[unsafe_option], allow_unsafe_options=True) + assert destination.exists() @with_rw_repo("HEAD") - def test_clone_from_allow_unsafe(self, repo): - bad_filename = pathlib.Path(f'{tempfile.gettempdir()}/{uuid.uuid4()}') - bad_url = f'ext::sh -c touch% {bad_filename}' - try: - repo.clone_from( - bad_url, 'tmp', - multi_options=["-c protocol.ext.allow=always"], - unsafe_protocols=True - ) - except GitCommandError: - pass - self.assertTrue(bad_filename.is_file()) - bad_filename.unlink() + def test_clone_from_safe_options(self, rw_repo): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + options = [ + "--depth=1", + "--single-branch", + "-q", + ] + for option in options: + destination = tmp_dir / option + assert not destination.exists() + Repo.clone_from(rw_repo.common_dir, destination, multi_options=[option]) + assert destination.exists() + + def test_clone_from_unsafe_procol(self): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + urls = [ + "ext::sh -c touch% /tmp/pwn", + "fd::17/foo", + ] + for url in urls: + with self.assertRaises(UnsafeProtocolError): + Repo.clone_from(url, tmp_dir) + + def test_clone_from_unsafe_procol_allowed(self): + tmp_dir = pathlib.Path(tempfile.mkdtemp()) + urls = [ + "ext::sh -c touch% /tmp/pwn", + "fd::/foo", + ] + for url in urls: + # The URL will be allowed into the command, but the command will + # fail since we don't have that protocol enabled in the Git config file. + with self.assertRaises(GitCommandError): + Repo.clone_from(url, tmp_dir, allow_unsafe_protocols=True) @with_rw_repo("HEAD") def test_max_chunk_size(self, repo): |