Problem: "rvim" can execute a shell through :diffpatch.
Solution: Disallow the shell "patch" command.
else
#endif
{
+ if (check_restricted())
+ goto theend;
+
// Build the patch command and execute it. Ignore errors. Switch to
// cooked mode to allow the user to respond to prompts.
vim_snprintf((char *)buf, buflen, "patch -o %s %s < %s",
// Do filetype detection with the new name.
if (au_has_group((char_u *)"filetypedetect"))
- do_cmdline_cmd((char_u *)":doau filetypedetect BufRead");
+ do_cmdline_cmd(
+ (char_u *)":doau filetypedetect BufRead");
}
}
}
bwipe!
endfunc
+" FIXME: test fails, the Xresult file can't be read
+func No_Test_diffpatch_restricted()
+ let lines =<< trim END
+ call assert_fails('diffpatch NoSuchDiff', 'E145:')
+
+ call writefile(v:errors, 'Xresult')
+ qa!
+ END
+ call writefile(lines, 'Xrestricted', 'D')
+ if RunVim([], [], '-Z --clean -S Xrestricted')
+ call assert_equal([], readfile('Xresult'))
+ endif
+ call delete('Xresult')
+endfunc
+
func Test_diff_too_many_buffers()
for i in range(1, 8)
exe "new Xtest" . i
static int included_patches[] =
{ /* Add new patch number below this line */
+/**/
+ 1440,
/**/
1439,
/**/