git-subtree-dir: third_party/nix
git-subtree-mainline: cf8cd640c1
git-subtree-split: be66c7a6b24e3c3c6157fd37b86c7203d14acf10
		
	
			
		
			
				
	
	
		
			36 lines
		
	
	
	
		
			1 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			36 lines
		
	
	
	
		
			1 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| # Test that users cannot register specially-crafted derivations that
 | |
| # produce output paths belonging to other derivations.  This could be
 | |
| # used to inject malware into the store.
 | |
| 
 | |
| source common.sh
 | |
| 
 | |
| clearStore
 | |
| 
 | |
| startDaemon
 | |
| 
 | |
| # Determine the output path of the "good" derivation.
 | |
| goodOut=$(nix-store -q $(nix-instantiate ./secure-drv-outputs.nix -A good))
 | |
| 
 | |
| # Instantiate the "bad" derivation.
 | |
| badDrv=$(nix-instantiate ./secure-drv-outputs.nix -A bad)
 | |
| badOut=$(nix-store -q $badDrv)
 | |
| 
 | |
| # Rewrite the bad derivation to produce the output path of the good
 | |
| # derivation.
 | |
| rm -f $TEST_ROOT/bad.drv
 | |
| sed -e "s|$badOut|$goodOut|g" < $badDrv > $TEST_ROOT/bad.drv
 | |
| 
 | |
| # Add the manipulated derivation to the store and build it.  This
 | |
| # should fail.
 | |
| if badDrv2=$(nix-store --add $TEST_ROOT/bad.drv); then
 | |
|     nix-store -r "$badDrv2"
 | |
| fi
 | |
| 
 | |
| # Now build the good derivation.
 | |
| goodOut2=$(nix-build ./secure-drv-outputs.nix -A good --no-out-link)
 | |
| test "$goodOut" = "$goodOut2"
 | |
| 
 | |
| if ! test -e "$goodOut"/good; then
 | |
|     echo "Bad derivation stole the output path of the good derivation!"
 | |
|     exit 1
 | |
| fi
 |