X-Git-Url: https://git.octo.it/?a=blobdiff_plain;f=daemon.c;h=bb014fa9c2cb8c02a3952d0fc521358222662da1;hb=50f9a858ada10b3b57691a313a1c78b0bcbe5947;hp=91b96569cd75c77cd4ee169c55be045daccf3908;hpb=f35230fb1123a0db4776c574a874aecec1f38db8;p=git.git diff --git a/daemon.c b/daemon.c index 91b96569..bb014fa9 100644 --- a/daemon.c +++ b/daemon.c @@ -9,13 +9,15 @@ #include #include "pkt-line.h" #include "cache.h" +#include "exec_cmd.h" static int log_syslog; static int verbose; static const char daemon_usage[] = "git-daemon [--verbose] [--syslog] [--inetd | --port=n] [--export-all]\n" -" [--timeout=n] [--init-timeout=n] [--strict-paths] [directory...]"; +" [--timeout=n] [--init-timeout=n] [--strict-paths]\n" +" [--base-path=path] [directory...]"; /* List of acceptable pathname prefixes */ static char **ok_paths = NULL; @@ -24,6 +26,9 @@ static int strict_paths = 0; /* If this is set, git-daemon-export-ok is not required */ static int export_all_trees = 0; +/* Take all paths relative to this one if non-NULL */ +static char *base_path = NULL; + /* Timeout, and initial timeout */ static unsigned int timeout = 0; static unsigned int init_timeout = 0; @@ -82,9 +87,74 @@ static void loginfo(const char *err, ...) va_end(params); } +static int avoid_alias(char *p) +{ + int sl, ndot; + + /* + * This resurrects the belts and suspenders paranoia check by HPA + * done in <435560F7.4080006@zytor.com> thread, now enter_repo() + * does not do getcwd() based path canonicalizations. + * + * sl becomes true immediately after seeing '/' and continues to + * be true as long as dots continue after that without intervening + * non-dot character. + */ + if (!p || (*p != '/' && *p != '~')) + return -1; + sl = 1; ndot = 0; + p++; + + while (1) { + char ch = *p++; + if (sl) { + if (ch == '.') + ndot++; + else if (ch == '/') { + if (ndot < 3) + /* reject //, /./ and /../ */ + return -1; + ndot = 0; + } + else if (ch == 0) { + if (0 < ndot && ndot < 3) + /* reject /.$ and /..$ */ + return -1; + return 0; + } + else + sl = ndot = 0; + } + else if (ch == 0) + return 0; + else if (ch == '/') { + sl = 1; + ndot = 0; + } + } +} + static char *path_ok(char *dir) { - char *path = enter_repo(dir, strict_paths); + char *path; + + if (avoid_alias(dir)) { + logerror("'%s': aliased", dir); + return NULL; + } + + if (base_path) { + static char rpath[PATH_MAX]; + if (*dir != '/') { + /* Forbid possible base-path evasion using ~paths. */ + logerror("'%s': Non-absolute path denied (base-path active)"); + return NULL; + } + snprintf(rpath, PATH_MAX, "%s%s", base_path, dir); + dir = rpath; + } + + path = enter_repo(dir, strict_paths); if (!path) { logerror("'%s': unable to chdir or not a git archive", dir); @@ -96,9 +166,11 @@ static char *path_ok(char *dir) int pathlen = strlen(path); /* The validation is done on the paths after enter_repo - * canonicalization, so whitelist should be written in - * terms of real pathnames (i.e. after ~user is expanded - * and symlinks resolved). + * appends optional {.git,.git/.git} and friends, but + * it does not use getcwd(). So if your /pub is + * a symlink to /mnt/pub, you can whitelist /pub and + * do not have to say /mnt/pub. + * Do not say /pub/. */ for ( pp = ok_paths ; *pp ; pp++ ) { int len = strlen(*pp); @@ -156,7 +228,7 @@ static int upload(char *dir) snprintf(timeout_buf, sizeof timeout_buf, "--timeout=%u", timeout); /* git-upload-pack only ever reads stuff, so this is safe */ - execlp("git-upload-pack", "git-upload-pack", "--strict", timeout_buf, ".", NULL); + execl_git_cmd("upload-pack", "--strict", timeout_buf, ".", NULL); return -1; } @@ -583,6 +655,10 @@ int main(int argc, char **argv) strict_paths = 1; continue; } + if (!strncmp(arg, "--base-path=", 12)) { + base_path = arg+12; + continue; + } if (!strcmp(arg, "--")) { ok_paths = &argv[i+1]; break;