-
-
Notifications
You must be signed in to change notification settings - Fork 359
Open
Labels
C-WindowsWindows-specific issuesWindows-specific issuesC-jjAn issue that affects https://github.com/jj-vcs/jjAn issue that affects https://github.com/jj-vcs/jjfeedback requestedhelp wantedExtra attention is neededExtra attention is needed
Description
Current behavior 😯
In the function is_path_owned_by_current_user
at
gitoxide/gix-sec/src/identity.rs
Line 83 in 3f2be40
pub fn is_path_owned_by_current_user(path: &Path) -> io::Result<bool> { |
I'm not quite sure what's broken. Maybe SE_FILE_OBJECT only works for regular files, or perhaps the to_wide_path() conversion is doing the wrong thing?
Expected behavior 🤔
Loading the repo, ideally.
Git behavior
It looks like git doesn't work out of the box, but provides an escape hatch:
fatal: detected dubious ownership in repository at '//wsl.localhost/Ubuntu/home/username/repo/.git'
To add an exception for this directory, call:
git config --global --add safe.directory '%(prefix)///wsl.localhost/Ubuntu/home/username/repo/.git'
Steps to reproduce 🕹
- Create a repository using a WSL shell gitoxide, git or anything else.
- Open a non-WSL shell and navigate to the directory.
- Call any function that checks repo trust (I did this using
jj
, which uses gitoxide for git repo access).
Metadata
Metadata
Assignees
Labels
C-WindowsWindows-specific issuesWindows-specific issuesC-jjAn issue that affects https://github.com/jj-vcs/jjAn issue that affects https://github.com/jj-vcs/jjfeedback requestedhelp wantedExtra attention is neededExtra attention is needed