2022-03-02 12:23:04 +01:00
|
|
|
safe.directory::
|
|
|
|
These config entries specify Git-tracked directories that are
|
|
|
|
considered safe even if they are owned by someone other than the
|
|
|
|
current user. By default, Git will refuse to even parse a Git
|
|
|
|
config of a repository owned by someone else, let alone run its
|
|
|
|
hooks, and this config setting allows users to specify exceptions,
|
|
|
|
e.g. for intentionally shared repositories (see the `--shared`
|
|
|
|
option in linkgit:git-init[1]).
|
|
|
|
+
|
|
|
|
This is a multi-valued setting, i.e. you can add more than one directory
|
|
|
|
via `git config --add`. To reset the list of safe directories (e.g. to
|
|
|
|
override any such directories specified in the system config), add a
|
|
|
|
`safe.directory` entry with an empty value.
|
|
|
|
+
|
|
|
|
This config setting is only respected when specified in a system or global
|
2022-04-27 19:06:49 +02:00
|
|
|
config, not when it is specified in a repository config, via the command
|
|
|
|
line option `-c safe.directory=<path>`, or in environment variables.
|
2022-03-02 12:23:04 +01:00
|
|
|
+
|
|
|
|
The value of this setting is interpolated, i.e. `~/<path>` expands to a
|
|
|
|
path relative to the home directory and `%(prefix)/<path>` expands to a
|
|
|
|
path relative to Git's (runtime) prefix.
|
2022-04-13 17:32:31 +02:00
|
|
|
+
|
|
|
|
To completely opt-out of this security check, set `safe.directory` to the
|
|
|
|
string `*`. This will allow all repositories to be treated as if their
|
|
|
|
directory was listed in the `safe.directory` list. If `safe.directory=*`
|
|
|
|
is set in system config and you want to re-enable this protection, then
|
|
|
|
initialize your list with an empty value before listing the repositories
|
|
|
|
that you deem safe.
|
git-compat-util: avoid failing dir ownership checks if running privileged
bdc77d1d685 (Add a function to determine whether a path is owned by the
current user, 2022-03-02) checks for the effective uid of the running
process using geteuid() but didn't account for cases where that user was
root (because git was invoked through sudo or a compatible tool) and the
original uid that repository trusted for its config was no longer known,
therefore failing the following otherwise safe call:
guy@renard ~/Software/uncrustify $ sudo git describe --always --dirty
[sudo] password for guy:
fatal: unsafe repository ('/home/guy/Software/uncrustify' is owned by someone else)
Attempt to detect those cases by using the environment variables that
those tools create to keep track of the original user id, and do the
ownership check using that instead.
This assumes the environment the user is running on after going
privileged can't be tampered with, and also adds code to restrict that
the new behavior only applies if running as root, therefore keeping the
most common case, which runs unprivileged, from changing, but because of
that, it will miss cases where sudo (or an equivalent) was used to change
to another unprivileged user or where the equivalent tool used to raise
privileges didn't track the original id in a sudo compatible way.
Because of compatibility with sudo, the code assumes that uid_t is an
unsigned integer type (which is not required by the standard) but is used
that way in their codebase to generate SUDO_UID. In systems where uid_t
is signed, sudo might be also patched to NOT be unsigned and that might
be able to trigger an edge case and a bug (as described in the code), but
it is considered unlikely to happen and even if it does, the code would
just mostly fail safely, so there was no attempt either to detect it or
prevent it by the code, which is something that might change in the future,
based on expected user feedback.
Reported-by: Guy Maurel <guy.j@maurel.de>
Helped-by: SZEDER Gábor <szeder.dev@gmail.com>
Helped-by: Randall Becker <rsbecker@nexbridge.com>
Helped-by: Phillip Wood <phillip.wood123@gmail.com>
Suggested-by: Johannes Schindelin <Johannes.Schindelin@gmx.de>
Signed-off-by: Carlo Marcelo Arenas Belón <carenas@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2022-05-13 03:00:18 +02:00
|
|
|
+
|
|
|
|
As explained, Git only allows you to access repositories owned by
|
|
|
|
yourself, i.e. the user who is running Git, by default. When Git
|
|
|
|
is running as 'root' in a non Windows platform that provides sudo,
|
|
|
|
however, git checks the SUDO_UID environment variable that sudo creates
|
|
|
|
and will allow access to the uid recorded as its value instead.
|
|
|
|
This is to make it easy to perform a common sequence during installation
|
|
|
|
"make && sudo make install". A git process running under 'sudo' runs as
|
|
|
|
'root' but the 'sudo' command exports the environment variable to record
|
|
|
|
which id the original user has.
|
|
|
|
If that is not what you would prefer and want git to only trust
|
|
|
|
repositories that are owned by root instead, then you must remove
|
|
|
|
the `SUDO_UID` variable from root's environment before invoking git.
|