This script has already expanded beyond its original intent of ".. in
submodule names" to include other malicious submodule bits. Let's update
the name and description to reflect that, as well as the fact that we'll
soon be adding similar tests for other dotfiles (.gitattributes, etc).
We'll also renumber it to move it out of the group of submodule-specific
tests.

Signed-off-by: Jeff King <peff@peff.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:
Jeff King 2021-05-01 11:42:08 -04:00 коммит произвёл Junio C Hamano
Родитель 0282f6799f
Коммит 43a2220f19
1 изменённых файлов: 10 добавлений и 3 удалений

Просмотреть файл

@ -1,9 +1,16 @@
#!/bin/sh
test_description='check handling of .. in submodule names
test_description='check broken or malicious patterns in .git* files
Exercise the name-checking function on a variety of names, and then give a
real-world setup that confirms we catch this in practice.
Such as:
- presence of .. in submodule names;
Exercise the name-checking function on a variety of names, and then give a
real-world setup that confirms we catch this in practice.
- nested submodule names
- symlinked .gitmodules, etc
'
. ./test-lib.sh
. "$TEST_DIRECTORY"/lib-pack.sh