Skip to content

Commit a28a3c9

Browse files
vdyedscho
authored andcommitted
Merge branch 'safe.directory-and-windows'
These two patches made it into Git for Windows v2.35.2, but not into Git v2.35.2. Signed-off-by: Victoria Dye <[email protected]> Signed-off-by: Johannes Schindelin <[email protected]>
2 parents 3004593 + 1404b94 commit a28a3c9

File tree

3 files changed

+72
-2
lines changed

3 files changed

+72
-2
lines changed

Documentation/config/safe.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,3 +40,9 @@ which id the original user has.
4040
If that is not what you would prefer and want git to only trust
4141
repositories that are owned by root instead, then you can remove
4242
the `SUDO_UID` variable from root's environment before invoking git.
43+
+
44+
Due to the permission model on Windows where ACLs are used instead of
45+
Unix' simpler permission model, it can be a bit tricky to figure out why
46+
a directory is considered unsafe. To help with this, Git will provide
47+
more detailed information when the environment variable
48+
`GIT_TEST_DEBUG_UNSAFE_DIRECTORIES` is set to `true`.

compat/mingw.c

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
#include "../git-compat-util.h"
22
#include "win32.h"
33
#include <aclapi.h>
4+
#include <sddl.h>
45
#include <conio.h>
56
#include <wchar.h>
67
#include "../strbuf.h"
@@ -2989,6 +2990,22 @@ static PSID get_current_user_sid(void)
29892990
return result;
29902991
}
29912992

2993+
static int acls_supported(const char *path)
2994+
{
2995+
size_t offset = offset_1st_component(path);
2996+
WCHAR wroot[MAX_PATH];
2997+
DWORD file_system_flags;
2998+
2999+
if (offset &&
3000+
xutftowcs_path_ex(wroot, path, MAX_PATH, offset,
3001+
MAX_PATH, 0) > 0 &&
3002+
GetVolumeInformationW(wroot, NULL, 0, NULL, NULL,
3003+
&file_system_flags, NULL, 0))
3004+
return !!(file_system_flags & FILE_PERSISTENT_ACLS);
3005+
3006+
return 0;
3007+
}
3008+
29923009
int is_path_owned_by_current_sid(const char *path)
29933010
{
29943011
WCHAR wpath[MAX_PATH];
@@ -3028,6 +3045,7 @@ int is_path_owned_by_current_sid(const char *path)
30283045
else if (sid && IsValidSid(sid)) {
30293046
/* Now, verify that the SID matches the current user's */
30303047
static PSID current_user_sid;
3048+
BOOL is_member;
30313049

30323050
if (!current_user_sid)
30333051
current_user_sid = get_current_user_sid();
@@ -3036,6 +3054,42 @@ int is_path_owned_by_current_sid(const char *path)
30363054
IsValidSid(current_user_sid) &&
30373055
EqualSid(sid, current_user_sid))
30383056
result = 1;
3057+
else if (IsWellKnownSid(sid, WinBuiltinAdministratorsSid) &&
3058+
CheckTokenMembership(NULL, sid, &is_member) &&
3059+
is_member)
3060+
/*
3061+
* If owned by the Administrators group, and the
3062+
* current user is an administrator, we consider that
3063+
* okay, too.
3064+
*/
3065+
result = 1;
3066+
else if (IsWellKnownSid(sid, WinWorldSid) &&
3067+
git_env_bool("GIT_TEST_DEBUG_UNSAFE_DIRECTORIES", 0) &&
3068+
!acls_supported(path)) {
3069+
/*
3070+
* On FAT32 volumes, ownership is not actually recorded.
3071+
*/
3072+
warning("'%s' is on a file system that does not record ownership", path);
3073+
} else if (git_env_bool("GIT_TEST_DEBUG_UNSAFE_DIRECTORIES", 0)) {
3074+
LPSTR str1, str2, to_free1 = NULL, to_free2 = NULL;
3075+
3076+
if (ConvertSidToStringSidA(sid, &str1))
3077+
to_free1 = str1;
3078+
else
3079+
str1 = "(inconvertible)";
3080+
3081+
if (!current_user_sid)
3082+
str2 = "(none)";
3083+
else if (!IsValidSid(current_user_sid))
3084+
str2 = "(invalid)";
3085+
else if (ConvertSidToStringSidA(current_user_sid, &str2))
3086+
to_free2 = str2;
3087+
else
3088+
str2 = "(inconvertible)";
3089+
warning("'%s' is owned by:\n\t'%s'\nbut the current user is:\n\t'%s'", path, str1, str2);
3090+
LocalFree(to_free1);
3091+
LocalFree(to_free2);
3092+
}
30393093
}
30403094

30413095
/*

setup.c

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1433,13 +1433,23 @@ const char *setup_git_directory_gently(int *nongit_ok)
14331433
case GIT_DIR_INVALID_OWNERSHIP:
14341434
if (!nongit_ok) {
14351435
struct strbuf quoted = STRBUF_INIT;
1436+
struct strbuf hint = STRBUF_INIT;
1437+
1438+
#ifdef __MINGW32__
1439+
if (!git_env_bool("GIT_TEST_DEBUG_UNSAFE_DIRECTORIES", 0))
1440+
strbuf_addstr(&hint,
1441+
_("\n\nSet the environment variable "
1442+
"GIT_TEST_DEBUG_UNSAFE_DIRECTORIES=true "
1443+
"and run\n"
1444+
"again for more information."));
1445+
#endif
14361446

14371447
sq_quote_buf_pretty(&quoted, dir.buf);
14381448
die(_("detected dubious ownership in repository at '%s'\n"
14391449
"To add an exception for this directory, call:\n"
14401450
"\n"
1441-
"\tgit config --global --add safe.directory %s"),
1442-
dir.buf, quoted.buf);
1451+
"\tgit config --global --add safe.directory %s%s"),
1452+
dir.buf, quoted.buf, hint.buf);
14431453
}
14441454
*nongit_ok = 1;
14451455
break;

0 commit comments

Comments
 (0)