summaryrefslogtreecommitdiff
path: root/util.c
diff options
context:
space:
mode:
authorDavid Dykstra <dwd@samba.org>1999-07-09 17:07:59 +0000
committerDavid Dykstra <dwd@samba.org>1999-07-09 17:07:59 +0000
commit79452d46930e5e3ec5b14d4c8380ff1e0329b9a8 (patch)
tree38409cea839f9272e0b92993a037f26e9ba008d2 /util.c
parentcb13abfed024d0320c0aa865ad652c946321df3c (diff)
downloadrsync-79452d46930e5e3ec5b14d4c8380ff1e0329b9a8.tar.gz
Add a couple clarifying points to the sanitize_path() comments.
One is a note that a leading "/" in a symlink target will not behave exactly as if a chroot had occurred, but I decided it wasn't worth the making it the same. The other is note about an extra harmless trailing "." that is added under some rare circumstances.
Diffstat (limited to 'util.c')
-rw-r--r--util.c19
1 files changed, 15 insertions, 4 deletions
diff --git a/util.c b/util.c
index 974e8651..2d1989d4 100644
--- a/util.c
+++ b/util.c
@@ -639,13 +639,18 @@ void clean_fname(char *name)
* 1. remove leading "/" (or replace with "." if at end)
* 2. remove leading ".." components (except those allowed by "reldir")
* 3. delete any other "<dir>/.." (recursively)
- * If "reldir" is non-null, it is a sanitized directory that the path will be
- * relative to, so allow as many ".." at the beginning of the path as
- * there are components in reldir.
+ * Can only shrink paths, so sanitizes in place.
* While we're at it, remove double slashes and "." components like
* clean_fname does(), but DON'T remove a trailing slash because that
* is sometimes significant on command line arguments.
- * Can only shrink paths, so sanitizes in place.
+ * If "reldir" is non-null, it is a sanitized directory that the path will be
+ * relative to, so allow as many ".." at the beginning of the path as
+ * there are components in reldir. This is used for symbolic link targets.
+ * If reldir is non-null and the path began with "/", to be completely like
+ * a chroot we should add in depth levels of ".." at the beginning of the
+ * path, but that would blow the assumption that the path doesn't grow and
+ * it is not likely to end up being a valid symlink anyway, so just do
+ * the normal removal of the leading "/" instead.
* Contributed by Dave Dykstra <dwd@bell-labs.com>
*/
@@ -723,6 +728,12 @@ void sanitize_path(char *p, char *reldir)
}
if ((sanp == start) && !allowdotdot) {
/* ended up with nothing, so put in "." component */
+ /*
+ * note that the !allowdotdot doesn't prevent this from
+ * happening in all allowed ".." situations, but I didn't
+ * think it was worth putting in an extra variable to ensure
+ * it since an extra "." won't hurt in those situations.
+ */
*sanp++ = '.';
}
*sanp = '\0';