mirror of
https://github.com/facebook/sapling.git
synced 2024-10-11 01:07:15 +03:00
1b98353d91
The following properties of a path are now checked for: - under top-level .hg - starts at the root of a windows drive - contains ".." - traverses a symlink (e.g. a/symlink_here/b) - inside a nested repository If any of these is true, the path is rejected. The check for traversing a symlink is arguably stricter than necessary; perhaps we should be checking for symlinks that point outside the repository.
9 lines
234 B
Plaintext
9 lines
234 B
Plaintext
% should fail
|
|
abort: path contains illegal component: .hg/00changelog.i
|
|
adding a/a
|
|
% should fail
|
|
abort: path 'b/b' traverses symbolic link 'b'
|
|
% should succeed
|
|
% should still fail - maybe
|
|
abort: path 'b/b' traverses symbolic link 'b'
|