equal
deleted
inserted
replaced
103 [255] |
103 [255] |
104 |
104 |
105 $ URL=`$PYTHON -c "import os; print 'file://localhost' + ('/' + os.getcwd().replace(os.sep, '/')).replace('//', '/') + '/../test'"` |
105 $ URL=`$PYTHON -c "import os; print 'file://localhost' + ('/' + os.getcwd().replace(os.sep, '/')).replace('//', '/') + '/../test'"` |
106 $ hg pull -q "$URL" |
106 $ hg pull -q "$URL" |
107 |
107 |
|
108 SEC: check for unsafe ssh url |
|
109 |
|
110 $ hg pull 'ssh://-oProxyCommand=touch${IFS}owned/path' |
|
111 pulling from ssh://-oProxyCommand%3Dtouch%24%7BIFS%7Downed/path |
|
112 abort: potentially unsafe url: 'ssh://-oProxyCommand=touch${IFS}owned/path' |
|
113 [255] |
|
114 $ hg pull 'ssh://%2DoProxyCommand=touch${IFS}owned/path' |
|
115 pulling from ssh://-oProxyCommand%3Dtouch%24%7BIFS%7Downed/path |
|
116 abort: potentially unsafe url: 'ssh://-oProxyCommand=touch${IFS}owned/path' |
|
117 [255] |
|
118 $ hg pull 'ssh://fakehost|shellcommand/path' |
|
119 pulling from ssh://fakehost%7Cshellcommand/path |
|
120 abort: potentially unsafe url: 'ssh://fakehost|shellcommand/path' |
|
121 [255] |
|
122 $ hg pull 'ssh://fakehost%7Cshellcommand/path' |
|
123 pulling from ssh://fakehost%7Cshellcommand/path |
|
124 abort: potentially unsafe url: 'ssh://fakehost|shellcommand/path' |
|
125 [255] |
|
126 |
108 $ cd .. |
127 $ cd .. |