1
1
Fork 0
mirror of https://github.com/NixOS/nix.git synced 2025-11-27 12:41:00 +01:00

libutil: Use openFileEnsureBeneathNoSymlinks in RestoreSink::createDirectory

Starts using the new function.
This commit is contained in:
Sergei Zimmerman 2025-11-25 01:10:35 +03:00
parent 77990e7cca
commit 3a9be9fd2f
No known key found for this signature in database
2 changed files with 13 additions and 3 deletions

View file

@ -329,6 +329,7 @@ TEST(openFileEnsureBeneathNoSymlinks, works)
{ {
std::filesystem::path tmpDir = nix::createTempDir(); std::filesystem::path tmpDir = nix::createTempDir();
nix::AutoDelete delTmpDir(tmpDir, /*recursive=*/true); nix::AutoDelete delTmpDir(tmpDir, /*recursive=*/true);
using namespace nix::unix;
{ {
RestoreSink sink(/*startFsync=*/false); RestoreSink sink(/*startFsync=*/false);
@ -341,12 +342,19 @@ TEST(openFileEnsureBeneathNoSymlinks, works)
sink.createSymlink(CanonPath("a/absolute_symlink"), tmpDir.string()); sink.createSymlink(CanonPath("a/absolute_symlink"), tmpDir.string());
sink.createSymlink(CanonPath("a/relative_symlink"), "../."); sink.createSymlink(CanonPath("a/relative_symlink"), "../.");
sink.createSymlink(CanonPath("a/broken_symlink"), "./nonexistent"); sink.createSymlink(CanonPath("a/broken_symlink"), "./nonexistent");
sink.createDirectory(CanonPath("a/b"), [](FileSystemObjectSink & dirSink, const CanonPath & relPath) {
dirSink.createDirectory(CanonPath("d"));
dirSink.createSymlink(CanonPath("c"), "./d");
});
sink.createDirectory(CanonPath("a/b/c/e")); // FIXME: This still follows symlinks
ASSERT_THROW(
sink.createDirectory(
CanonPath("a/b/c/f"), [](FileSystemObjectSink & dirSink, const CanonPath & relPath) {}),
SymlinkNotAllowed);
} }
AutoCloseFD dirFd = openDirectory(tmpDir); AutoCloseFD dirFd = openDirectory(tmpDir);
using namespace nix::unix;
auto open = [&](std::string_view path, int flags, mode_t mode = 0) { auto open = [&](std::string_view path, int flags, mode_t mode = 0) {
return openFileEnsureBeneathNoSymlinks(dirFd.get(), CanonPath(path), flags, mode); return openFileEnsureBeneathNoSymlinks(dirFd.get(), CanonPath(path), flags, mode);
}; };
@ -356,6 +364,7 @@ TEST(openFileEnsureBeneathNoSymlinks, works)
EXPECT_THROW(open("a/absolute_symlink/a", O_RDONLY), SymlinkNotAllowed); EXPECT_THROW(open("a/absolute_symlink/a", O_RDONLY), SymlinkNotAllowed);
EXPECT_THROW(open("a/absolute_symlink/c/d", O_RDONLY), SymlinkNotAllowed); EXPECT_THROW(open("a/absolute_symlink/c/d", O_RDONLY), SymlinkNotAllowed);
EXPECT_THROW(open("a/relative_symlink/c", O_RDONLY), SymlinkNotAllowed); EXPECT_THROW(open("a/relative_symlink/c", O_RDONLY), SymlinkNotAllowed);
EXPECT_THROW(open("a/b/c/d", O_RDONLY), SymlinkNotAllowed);
EXPECT_EQ(open("a/broken_symlink", O_CREAT | O_WRONLY | O_EXCL, 0666), INVALID_DESCRIPTOR); EXPECT_EQ(open("a/broken_symlink", O_CREAT | O_WRONLY | O_EXCL, 0666), INVALID_DESCRIPTOR);
/* Sanity check, no symlink shenanigans and behaves the same as regular openat with O_EXCL | O_CREAT. */ /* Sanity check, no symlink shenanigans and behaves the same as regular openat with O_EXCL | O_CREAT. */
EXPECT_EQ(errno, EEXIST); EXPECT_EQ(errno, EEXIST);

View file

@ -84,7 +84,8 @@ void RestoreSink::createDirectory(const CanonPath & path, DirectoryCreatedCallba
RestoreSink dirSink{startFsync}; RestoreSink dirSink{startFsync};
dirSink.dstPath = append(dstPath, path); dirSink.dstPath = append(dstPath, path);
dirSink.dirFd = ::openat(dirFd.get(), path.rel_c_str(), O_RDONLY | O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC); dirSink.dirFd =
unix::openFileEnsureBeneathNoSymlinks(dirFd.get(), path, O_RDONLY | O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC);
if (!dirSink.dirFd) if (!dirSink.dirFd)
throw SysError("opening directory '%s'", dirSink.dstPath.string()); throw SysError("opening directory '%s'", dirSink.dstPath.string());