Open
Description
Current behavior 😯
In the function is_path_owned_by_current_user
at
gitoxide/gix-sec/src/identity.rs
Line 83 in 3f2be40
I'm not quite sure what's broken. Maybe SE_FILE_OBJECT only works for regular files, or perhaps the to_wide_path() conversion is doing the wrong thing?
Expected behavior 🤔
Loading the repo, ideally.
Git behavior
It looks like git doesn't work out of the box, but provides an escape hatch:
fatal: detected dubious ownership in repository at '//wsl.localhost/Ubuntu/home/username/repo/.git'
To add an exception for this directory, call:
git config --global --add safe.directory '%(prefix)///wsl.localhost/Ubuntu/home/username/repo/.git'
Steps to reproduce 🕹
- Create a repository using a WSL shell gitoxide, git or anything else.
- Open a non-WSL shell and navigate to the directory.
- Call any function that checks repo trust (I did this using
jj
, which uses gitoxide for git repo access).