git-subtree-dir: third_party/nix
git-subtree-mainline: cf8cd640c1
git-subtree-split: be66c7a6b24e3c3c6157fd37b86c7203d14acf10
		
	
			
		
			
				
	
	
		
			51 lines
		
	
	
	
		
			2.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			51 lines
		
	
	
	
		
			2.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| source common.sh
 | |
| 
 | |
| clearStore
 | |
| 
 | |
| nix-instantiate --restrict-eval --eval -E '1 + 2'
 | |
| (! nix-instantiate --restrict-eval ./restricted.nix)
 | |
| (! nix-instantiate --eval --restrict-eval <(echo '1 + 2'))
 | |
| nix-instantiate --restrict-eval ./simple.nix -I src=.
 | |
| nix-instantiate --restrict-eval ./simple.nix -I src1=simple.nix -I src2=config.nix -I src3=./simple.builder.sh
 | |
| 
 | |
| (! nix-instantiate --restrict-eval --eval -E 'builtins.readFile ./simple.nix')
 | |
| nix-instantiate --restrict-eval --eval -E 'builtins.readFile ./simple.nix' -I src=..
 | |
| 
 | |
| (! nix-instantiate --restrict-eval --eval -E 'builtins.readDir ../src/nix-channel')
 | |
| nix-instantiate --restrict-eval --eval -E 'builtins.readDir ../src/nix-channel' -I src=../src
 | |
| 
 | |
| (! nix-instantiate --restrict-eval --eval -E 'let __nixPath = [ { prefix = "foo"; path = ./.; } ]; in <foo>')
 | |
| nix-instantiate --restrict-eval --eval -E 'let __nixPath = [ { prefix = "foo"; path = ./.; } ]; in <foo>' -I src=.
 | |
| 
 | |
| p=$(nix eval --raw "(builtins.fetchurl file://$(pwd)/restricted.sh)" --restrict-eval --allowed-uris "file://$(pwd)")
 | |
| cmp $p restricted.sh
 | |
| 
 | |
| (! nix eval --raw "(builtins.fetchurl file://$(pwd)/restricted.sh)" --restrict-eval)
 | |
| 
 | |
| (! nix eval --raw "(builtins.fetchurl file://$(pwd)/restricted.sh)" --restrict-eval --allowed-uris "file://$(pwd)/restricted.sh/")
 | |
| 
 | |
| nix eval --raw "(builtins.fetchurl file://$(pwd)/restricted.sh)" --restrict-eval --allowed-uris "file://$(pwd)/restricted.sh"
 | |
| 
 | |
| (! nix eval --raw "(builtins.fetchurl https://github.com/NixOS/patchelf/archive/master.tar.gz)" --restrict-eval)
 | |
| (! nix eval --raw "(builtins.fetchTarball https://github.com/NixOS/patchelf/archive/master.tar.gz)" --restrict-eval)
 | |
| (! nix eval --raw "(fetchGit git://github.com/NixOS/patchelf.git)" --restrict-eval)
 | |
| 
 | |
| ln -sfn $(pwd)/restricted.nix $TEST_ROOT/restricted.nix
 | |
| [[ $(nix-instantiate --eval $TEST_ROOT/restricted.nix) == 3 ]]
 | |
| (! nix-instantiate --eval --restrict-eval $TEST_ROOT/restricted.nix)
 | |
| (! nix-instantiate --eval --restrict-eval $TEST_ROOT/restricted.nix -I $TEST_ROOT)
 | |
| (! nix-instantiate --eval --restrict-eval $TEST_ROOT/restricted.nix -I .)
 | |
| nix-instantiate --eval --restrict-eval $TEST_ROOT/restricted.nix -I $TEST_ROOT -I .
 | |
| 
 | |
| [[ $(nix eval --raw --restrict-eval -I . '(builtins.readFile "${import ./simple.nix}/hello")') == 'Hello World!' ]]
 | |
| 
 | |
| # Check whether we can leak symlink information through directory traversal.
 | |
| traverseDir="$(pwd)/restricted-traverse-me"
 | |
| ln -sfn "$(pwd)/restricted-secret" "$(pwd)/restricted-innocent"
 | |
| mkdir -p "$traverseDir"
 | |
| goUp="..$(echo "$traverseDir" | sed -e 's,[^/]\+,..,g')"
 | |
| output="$(nix eval --raw --restrict-eval -I "$traverseDir" \
 | |
|     "(builtins.readFile \"$traverseDir/$goUp$(pwd)/restricted-innocent\")" \
 | |
|     2>&1 || :)"
 | |
| echo "$output" | grep "is forbidden"
 | |
| ! echo "$output" | grep -F restricted-secret
 |