Add 'third_party/nix/' from commit 'be66c7a6b24e3c3c6157fd37b86c7203d14acf10'
git-subtree-dir: third_party/nix
git-subtree-mainline: cf8cd640c1
git-subtree-split: be66c7a6b24e3c3c6157fd37b86c7203d14acf10
This commit is contained in:
commit
7994fd1d54
737 changed files with 105390 additions and 0 deletions
36
third_party/nix/tests/secure-drv-outputs.sh
vendored
Normal file
36
third_party/nix/tests/secure-drv-outputs.sh
vendored
Normal file
|
@ -0,0 +1,36 @@
|
|||
# Test that users cannot register specially-crafted derivations that
|
||||
# produce output paths belonging to other derivations. This could be
|
||||
# used to inject malware into the store.
|
||||
|
||||
source common.sh
|
||||
|
||||
clearStore
|
||||
|
||||
startDaemon
|
||||
|
||||
# Determine the output path of the "good" derivation.
|
||||
goodOut=$(nix-store -q $(nix-instantiate ./secure-drv-outputs.nix -A good))
|
||||
|
||||
# Instantiate the "bad" derivation.
|
||||
badDrv=$(nix-instantiate ./secure-drv-outputs.nix -A bad)
|
||||
badOut=$(nix-store -q $badDrv)
|
||||
|
||||
# Rewrite the bad derivation to produce the output path of the good
|
||||
# derivation.
|
||||
rm -f $TEST_ROOT/bad.drv
|
||||
sed -e "s|$badOut|$goodOut|g" < $badDrv > $TEST_ROOT/bad.drv
|
||||
|
||||
# Add the manipulated derivation to the store and build it. This
|
||||
# should fail.
|
||||
if badDrv2=$(nix-store --add $TEST_ROOT/bad.drv); then
|
||||
nix-store -r "$badDrv2"
|
||||
fi
|
||||
|
||||
# Now build the good derivation.
|
||||
goodOut2=$(nix-build ./secure-drv-outputs.nix -A good --no-out-link)
|
||||
test "$goodOut" = "$goodOut2"
|
||||
|
||||
if ! test -e "$goodOut"/good; then
|
||||
echo "Bad derivation stole the output path of the good derivation!"
|
||||
exit 1
|
||||
fi
|
Loading…
Add table
Add a link
Reference in a new issue