Girocco/Config.pm: add git-daemon host matching settings
[girocco.git] / bin / git-daemon-verify
blobbae5ac71059af300879f12ba2b64e4bee4b80d3c
1 #!/bin/sh
3 # Abort any fetch early if the fetch is invalid or times out.
4 # This avoids unnecessary traffic and unpacked object pollution.
6 # This script is called for fetch, archive and push.
7 # Push requests are outright rejected and so are paths starting with ~.
9 set -e
11 . @basedir@/shlib.sh
13 unset GIT_USER_AGENT
14 unset GIT_HTTP_USER_AGENT
15 if [ -n "$defined_cfg_git_server_ua" ]; then
16 GIT_USER_AGENT="$cfg_git_server_ua"
17 export GIT_USER_AGENT
20 [ -z "$GIT_DAEMON_BIN" ] || cfg_git_daemon_bin="$GIT_DAEMON_BIN"
21 [ -n "$cfg_git_daemon_bin" ] ||
22 cfg_git_daemon_bin="$var_git_exec_path/git-daemon"
24 logmsg()
26 [ "${cfg_suppress_git_ssh_logging:-0}" = "0" ] || return 0
27 _msg="$(LC_ALL=C tr -c '\040-\176' '[?*]' <<EOT
29 EOT
30 )" && _msg="${_msg%[?]}" &&
31 logger -t "${0##*/}[$$]" <<EOT
32 $_msg
33 EOT
36 errormsg()
38 _l="$*"
39 printf '%04xERR %s' $(( 8 + ${#_l} )) "$_l"
42 invalbaderr()
44 errormsg "invalid or incomplete request"
47 invalerr()
49 errormsg "invalid or unsupported request"
52 denied()
54 errormsg "access denied or no such repository"
57 internalerr()
59 printf '%s\n' "git-daemon-verify: $*" >&2
60 errormsg "internal server error"
63 # A quick sanity check
64 if [ -z "$cfg_git_daemon_bin" ] || ! [ -x "$cfg_git_daemon_bin" ]; then
65 internalerr "bad cfg_git_daemon_bin: $cfg_git_daemon_bin"
66 exit 1
68 case "$cfg_reporoot" in /?*) :;; *)
69 internalerr "bad reporoot: $cfg_reporoot"
70 exit 1
71 esac
73 PATH="$(dirname "$cfg_git_daemon_bin"):$PATH"
74 export PATH
76 if ! request="$("$cfg_basedir/bin/peek_packet")" || [ -z "$request" ]; then
77 invalbaderr
78 exit 1
81 _IFS="$IFS"
82 IFS='
84 set -- $request
85 IFS="$_IFS"
86 [ $# -ge 1 ] || { invalidbaderr; exit 1; }
87 request="$1"
88 shift
90 # Extract host and port now
91 [ "${hnam+set}" != "set" ] || unset hnam
92 [ "${pnum+set}" != "set" ] || unset pnum
93 [ "${hostport+set}" != "set" ] || unset hostport
94 for extra in "$@"; do
95 case "$extra" in
96 "host="*) hnam="${extra#host=}";;
97 "port="*) pnum="${extra#port=}";;
98 esac
99 done
100 # Make nice hostport variable for later use
101 if [ "${hnam+set}" = "set" ]; then
102 case "$hnam" in
103 *":"*) hostport="[$hnam]";;
104 *) hostport="$hnam";;
105 esac
106 [ "${pnum+set}" != "set" ] || hostport="$hostport:$pnum"
109 # The request should look like one of the following
111 # git-upload-pack /dir
112 # git-upload-pack ~name/dir
113 # git-upload-archive /dir
114 # git-upload-archive ~name/dir
115 # git-receive-pack /dir
116 # git-receive-pack ~name/dir
118 # Where the '~' forms are relative to a user's home directory.
119 # A trailing '/' is optional as well as a final '.git'.
120 # git-receive-pack and paths starting with '~' are rejected outright.
122 type=
123 dir=
124 case "$request" in
125 "git-upload-pack "*) type='upload-pack'; dir="${request#git-upload-pack }";;
126 "git-upload-archive "*) type='upload-archive'; dir="${request#git-upload-archive }";;
127 "git-receive-pack "*) type='receive-pack'; dir="${request#git-receive-pack }";;
129 invalerr
130 exit 1
131 esac
132 if [ "$type" = 'receive-pack' ]; then
133 logmsg "denied $type $dir${hostport+ host=$hostport}"
134 invalerr
135 exit 1
137 case "$dir" in /*) :;; *)
138 logmsg "denied $type $dir${hostport+ host=$hostport}"
139 invalerr
140 exit 1
141 esac
143 # remove extraneous '/' chars
144 proj="${dir#/}"
145 proj="${proj%/}"
146 # add a missing .git
147 case "$proj" in
148 *.git) :;;
150 proj="$proj.git"
151 esac
153 # Reject any project names that start with _ or contain ..
154 case "$proj" in _*|*..*)
155 logmsg "denied $type $dir${hostport+ host=$hostport}"
156 denied
157 exit 1
158 esac
160 odir="$dir"
161 reporoot="$cfg_reporoot"
162 dir="$reporoot/$proj"
164 # Valid project names never end in .git (we add that automagically), so a valid
165 # fork can never have .git at the end of any path component except the last.
166 # We check this to avoid a situation where a certain collection of pushed refs
167 # could be mistaken for a GIT_DIR. Git would ultimately complain, but some
168 # undesirable things could happen along the way.
170 # Remove the leading $reporoot and trailing .git to get a test string
171 testpath="${dir#$reporoot/}"
172 testpath="${testpath%.git}"
173 case "$testpath/" in *.[Gg][Ii][Tt]/*|_*)
174 logmsg "denied $type $odir${hostport+ host=$hostport}"
175 denied
176 exit 1
177 esac
179 if ! [ -d "$dir" ] || ! [ -f "$dir/HEAD" ] || ! [ -d "$dir/objects" ]; then
180 logmsg "denied $type $odir${hostport+ host=$hostport}"
181 denied
182 exit 1
185 [ -z "$var_upload_window" ] || [ "$type" != "upload-pack" ] ||
186 git_add_config "pack.window=$var_upload_window"
188 if [ "${cfg_fetch_stash_refs:-0}" = "0" ]; then
189 git_add_config "uploadpack.hiderefs=refs/stash"
190 git_add_config "uploadpack.hiderefs=refs/tgstash"
193 logmsg "accepted $type $odir${hostport+ host=$hostport}"
194 exec "$cfg_git_daemon_bin" --inetd --verbose --export-all --enable=upload-archive --base-path="$cfg_reporoot"
195 internalerr "exec failed: $cfg_git_daemon_bin"
196 exit 1