mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 21:19:50 +01:00
0c5696248b
The test never actually tested what it claims to test because it did not properly insert separators before `..`. PR-URL: https://github.com/nodejs/node/pull/50124 Reviewed-By: Yagiz Nizipli <yagiz@nizipli.com> Reviewed-By: Rafael Gonzaga <rafael.nunu@hotmail.com>
52 lines
1.3 KiB
JavaScript
52 lines
1.3 KiB
JavaScript
// Flags: --experimental-permission --allow-fs-read=* --allow-fs-write=* --allow-child-process
|
|
'use strict';
|
|
|
|
const common = require('../common');
|
|
common.skipIfWorker();
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
if (!common.canCreateSymLink())
|
|
common.skip('insufficient privileges');
|
|
if (!common.hasCrypto)
|
|
common.skip('no crypto');
|
|
|
|
const assert = require('assert');
|
|
const fs = require('fs');
|
|
const { spawnSync } = require('child_process');
|
|
const path = require('path');
|
|
const tmpdir = require('../common/tmpdir');
|
|
|
|
const file = fixtures.path('permission', 'fs-traversal.js');
|
|
const blockedFolder = tmpdir.path;
|
|
const allowedFolder = tmpdir.resolve('subdirectory');
|
|
const commonPathWildcard = path.join(__filename, '../../common*');
|
|
|
|
{
|
|
tmpdir.refresh();
|
|
fs.mkdirSync(allowedFolder);
|
|
}
|
|
|
|
{
|
|
const { status, stderr } = spawnSync(
|
|
process.execPath,
|
|
[
|
|
'--experimental-permission',
|
|
`--allow-fs-read=${file}`, `--allow-fs-read=${commonPathWildcard}`, `--allow-fs-read=${allowedFolder}`,
|
|
`--allow-fs-write=${allowedFolder}`,
|
|
file,
|
|
],
|
|
{
|
|
env: {
|
|
...process.env,
|
|
BLOCKEDFOLDER: blockedFolder,
|
|
ALLOWEDFOLDER: allowedFolder,
|
|
},
|
|
}
|
|
);
|
|
assert.strictEqual(status, 0, stderr.toString());
|
|
}
|
|
|
|
{
|
|
tmpdir.refresh();
|
|
}
|