comparison tests/test-git-clone.t @ 1043:9b09dd0a6308

ssh: expand test coverage for ssh vulnerability
author Kevin Bullock <kbullock@ringworld.org>
date Wed, 09 Aug 2017 21:34:15 -0400
parents b4d2180739bb
children c35751c248c3
comparison
equal deleted inserted replaced
1042:b4d2180739bb 1043:9b09dd0a6308
43 abort: potentially unsafe hostname: '-oProxyCommand=rm${IFS}nonexistent' 43 abort: potentially unsafe hostname: '-oProxyCommand=rm${IFS}nonexistent'
44 [1] 44 [1]
45 $ hg clone 'git+ssh://%2DoProxyCommand=rm${IFS}nonexistent/path' | grep -v 'destination\|pulling from' 45 $ hg clone 'git+ssh://%2DoProxyCommand=rm${IFS}nonexistent/path' | grep -v 'destination\|pulling from'
46 abort: potentially unsafe hostname: '-oProxyCommand=rm${IFS}nonexistent' 46 abort: potentially unsafe hostname: '-oProxyCommand=rm${IFS}nonexistent'
47 [1] 47 [1]
48 48 $ hg clone 'git+ssh://fakehost|shellcommand/path' | grep -v 'destination\|pulling from'
49 $ hg init a 49 abort: potentially unsafe hostname: 'fakehost|shellcommand'
50 $ cd a
51 $ hg pull 'git+ssh://-oProxyCommand=rm${IFS}nonexistent/path' | grep -v 'destination\|pulling from'
52 abort: potentially unsafe hostname: '-oProxyCommand=rm${IFS}nonexistent'
53 [1] 50 [1]
51 $ hg clone 'git+ssh://fakehost%7Cshellcommand/path' | grep -v 'destination\|pulling from'
52 abort: potentially unsafe hostname: 'fakehost|shellcommand'
53 [1]