зеркало из https://github.com/microsoft/git.git
mingw: only test index entries for backslashes, not tree entries
During a clone of a repository that contained a file with a backslash in its name in the past, as of v2.24.1(2), Git for Windows prints errors like this: error: filename in tree entry contains backslash: '\' The idea is to prevent Git from even trying to write files with backslashes in their file names: while these characters are valid in file names on other platforms, on Windows it is interpreted as directory separator (which would obviously lead to ambiguities, e.g. when there is a file `a\b` and there is also a file `a/b`). Arguably, this is the wrong layer for that error: As long as the user never checks out the files whose names contain backslashes, there should not be any problem in the first place. So let's loosen the requirements: we now leave tree entries with backslashes in their file names alone, but we do require any entries that are added to the Git index to contain no backslashes on Windows. Note: just as before, the check is guarded by `core.protectNTFS` (to allow overriding the check by toggling that config setting), and it is _only_ performed on Windows, as the backslash is not a directory separator elsewhere, even when writing to NTFS-formatted volumes. An alternative approach would be to try to prevent creating files with backslashes in their file names. However, that comes with its own set of problems. For example, `git config -f C:\ProgramData\Git\config ...` is a very valid way to specify a custom config location, and we obviously do _not_ want to prevent that. Therefore, the approach chosen in this patch would appear to be better. This addresses https://github.com/git-for-windows/git/issues/2435 Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:
Родитель
53a06cf39b
Коммит
224c7d70fa
|
@ -1278,6 +1278,11 @@ static int add_index_entry_with_check(struct index_state *istate, struct cache_e
|
||||||
int skip_df_check = option & ADD_CACHE_SKIP_DFCHECK;
|
int skip_df_check = option & ADD_CACHE_SKIP_DFCHECK;
|
||||||
int new_only = option & ADD_CACHE_NEW_ONLY;
|
int new_only = option & ADD_CACHE_NEW_ONLY;
|
||||||
|
|
||||||
|
#ifdef GIT_WINDOWS_NATIVE
|
||||||
|
if (protect_ntfs && strchr(ce->name, '\\'))
|
||||||
|
return error(_("filename in tree entry contains backslash: '%s'"), ce->name);
|
||||||
|
#endif
|
||||||
|
|
||||||
if (!(option & ADD_CACHE_KEEP_CACHE_TREE))
|
if (!(option & ADD_CACHE_KEEP_CACHE_TREE))
|
||||||
cache_tree_invalidate_path(istate, ce->name);
|
cache_tree_invalidate_path(istate, ce->name);
|
||||||
|
|
||||||
|
|
|
@ -207,6 +207,9 @@ test_expect_success MINGW 'prevent git~1 squatting on Windows' '
|
||||||
git hash-object -w --stdin)" &&
|
git hash-object -w --stdin)" &&
|
||||||
rev="$(git rev-parse --verify HEAD)" &&
|
rev="$(git rev-parse --verify HEAD)" &&
|
||||||
hash="$(echo x | git hash-object -w --stdin)" &&
|
hash="$(echo x | git hash-object -w --stdin)" &&
|
||||||
|
test_must_fail git update-index --add \
|
||||||
|
--cacheinfo 160000,$rev,d\\a 2>err &&
|
||||||
|
test_i18ngrep backslash err &&
|
||||||
git -c core.protectNTFS=false update-index --add \
|
git -c core.protectNTFS=false update-index --add \
|
||||||
--cacheinfo 100644,$modules,.gitmodules \
|
--cacheinfo 100644,$modules,.gitmodules \
|
||||||
--cacheinfo 160000,$rev,c \
|
--cacheinfo 160000,$rev,c \
|
||||||
|
@ -214,9 +217,7 @@ test_expect_success MINGW 'prevent git~1 squatting on Windows' '
|
||||||
--cacheinfo 100644,$hash,d./a/x \
|
--cacheinfo 100644,$hash,d./a/x \
|
||||||
--cacheinfo 100644,$hash,d./a/..git &&
|
--cacheinfo 100644,$hash,d./a/..git &&
|
||||||
test_tick &&
|
test_tick &&
|
||||||
git -c core.protectNTFS=false commit -m "module" &&
|
git -c core.protectNTFS=false commit -m "module"
|
||||||
test_must_fail git show HEAD: 2>err &&
|
|
||||||
test_i18ngrep backslash err
|
|
||||||
) &&
|
) &&
|
||||||
test_must_fail git -c core.protectNTFS=false \
|
test_must_fail git -c core.protectNTFS=false \
|
||||||
clone --recurse-submodules squatting squatting-clone 2>err &&
|
clone --recurse-submodules squatting squatting-clone 2>err &&
|
||||||
|
|
|
@ -43,12 +43,6 @@ static int decode_tree_entry(struct tree_desc *desc, const char *buf, unsigned l
|
||||||
strbuf_addstr(err, _("empty filename in tree entry"));
|
strbuf_addstr(err, _("empty filename in tree entry"));
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
#ifdef GIT_WINDOWS_NATIVE
|
|
||||||
if (protect_ntfs && strchr(path, '\\')) {
|
|
||||||
strbuf_addf(err, _("filename in tree entry contains backslash: '%s'"), path);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
len = strlen(path) + 1;
|
len = strlen(path) + 1;
|
||||||
|
|
||||||
/* Initialize the descriptor entry */
|
/* Initialize the descriptor entry */
|
||||||
|
|
Загрузка…
Ссылка в новой задаче