diff options
author | Kyle Lippincott <spectral@google.com> | 2024-01-20 03:08:22 +0300 |
---|---|---|
committer | Junio C Hamano <gitster@pobox.com> | 2024-01-21 01:11:49 +0300 |
commit | 45bb91624804d3e3a70cfc1ba0eae5577f81fc38 (patch) | |
tree | 318b9e0ddad9816c8548b55fc049b22fe5e9b6eb /commit-graph.c | |
parent | 564d0252ca632e0264ed670534a51d18a689ef5d (diff) |
setup: allow cwd=.git w/ bareRepository=explicit
The safe.bareRepository setting can be set to 'explicit' to disallow
implicit uses of bare repositories, preventing an attack [1] where an
artificial and malicious bare repository is embedded in another git
repository. Unfortunately, some tooling uses myrepo/.git/ as the cwd
when executing commands, and this is blocked when
safe.bareRepository=explicit. Blocking is unnecessary, as git already
prevents nested .git directories.
Teach git to not reject uses of git inside of the .git directory: check
if cwd is .git (or a subdirectory of it) and allow it even if
safe.bareRepository=explicit.
[1] https://github.com/justinsteven/advisories/blob/main/2022_git_buried_bare_repos_and_fsmonitor_various_abuses.md
Signed-off-by: Kyle Lippincott <spectral@google.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
Diffstat (limited to 'commit-graph.c')
0 files changed, 0 insertions, 0 deletions