update/gc: set traps after cd to project dir
[girocco.git] / apache.conf.in
blobdbbe46c2fb07b459c5fe5986c8d5b78b62ab132a
1 ## To convert this file to apache.conf using the current Girocco::Config values
2 ## either do "make" or "make apache.conf" or ./make-apache-conf.sh
3 ##
4 # This is an example configuration of a virtualhost running Girocco, as set up
5 # at repo.or.cz; unfortunately, completely independent from Girocco::Config.
6 # It is not essential for Girocco to use a special virtualhost, however.
7 <VirtualHost *:80>
9         ServerName @@httpdnsname@@
10         ServerAlias www.@@httpdnsname@@
11         ServerAdmin @@admin@@
13         ErrorLog /var/log/apache2/repo-error.log
14         CustomLog /var/log/apache2/repo-access.log combined
16         AddHandler cgi-script .cgi
18         DocumentRoot @@webroot@@
19         <Directory @@webroot@@>
20                 # Add MultiViews only if pages are truly
21                 # offered in more than a single language
22                 Options FollowSymLinks ExecCGI
23                 AllowOverride All
24                 Order allow,deny
25                 Allow from all
26                 DirectoryIndex gitweb.cgi
27                 Satisfy all
28         </Directory>
30         ScriptAlias /w @@cgiroot@@/gitweb.cgi
31         ScriptAlias /h @@cgiroot@@/html.cgi
33         <IfModule rewrite_module>
34                 RewriteEngine On
35                 # Redirect bare /w requests without .git that name an existing repo...
36                 RewriteCond @@reporoot@@/$1.git/HEAD -f
37                 RewriteRule \
38                         ^/w/((?:[a-zA-Z0-9+._-]+(?<!\.git)/)*[a-zA-Z0-9+._-]+(?<!\.git))/?$ \
39                         /w/$1.git [L,R=301]
41                 # ...and also make the leading /w optional for those types of requests
42                 RewriteCond %{HTTP_USER_AGENT} !git/ [NC]
43                 RewriteCond @@reporoot@@/$1.git/HEAD -f
44                 RewriteRule \
45                         ^/(?!w/)((?:[a-zA-Z0-9+._-]+(?<!\.git)/)*[a-zA-Z0-9+._-]+(?<!\.git))/?$ \
46                         /$1.git [L,R=301]
48                 # Make the leading /w optional if the rest names an existing repo
49                 RewriteCond %{HTTP_USER_AGENT} !git/ [NC]
50                 RewriteCond @@reporoot@@/$1/HEAD -f
51                 # Might want to use [L,R] instead of [PT] maybe even [L,R=301]
52                 RewriteRule \
53                         ^/(?!w/)((?:[a-zA-Z0-9+._-]+(?<!\.git)/)*[a-zA-Z0-9+._-]+?\.git)((?:/.*)?)$ \
54                         /w/$1$2 [PT]
55         </IfModule>
57         <Directory @@reporoot@@>
58                 Options FollowSymLinks
59                 AllowOverride None
60                 Order allow,deny
61                 Allow from all
62                 Satisfy all
64                 <IfModule rewrite_module>
65                         # Everything fetched over the non-smart git http
66                         # protocol should be an existing file.  If the request
67                         # is not for an existing file, just send back an error
68                         # message without emitting anything into the error log.
69                         RewriteEngine On
70                         RewriteCond %{REQUEST_FILENAME} !-f
71                         RewriteRule .* - [R=404,L]
72                 </IfModule>
73         </Directory>
75         <Directory @@basedir@@/bin>
76                 Options None
77                 AllowOverride None
78                 Order deny,allow
79                 Deny from all
80                 <Files git-http-backend-verify>
81                         Options ExecCGI
82                         Allow from all
83                 </Files>
84                 Satisfy all
85         </Directory>
87         # By default non-smart HTTP fetch access will be allowed, however
88         # by defining SmartHTTPOnly (or changing the sense of the IfDefine tests)
89         # non-smart HTTP requests can be denied directly by the web server
91         <IfDefine !SmartHTTPOnly>
92         # These accelerate non-smart HTTP access to loose objects and packs with the /r/ prefix
93         # But not for projects starting with '_' to which access should never be allowed
94         AliasMatch ^/r/([^_].*/objects/[0-9a-f]{2}/[0-9a-f]{38})$               @@reporoot@@/$1
95         AliasMatch ^/r/([^_].*/objects/pack/pack-[0-9a-f]{40}.(pack|idx))$      @@reporoot@@/$1
97         # These accelerate non-smart HTTP access for Git user agents without the /r/ prefix
98         # But not for projects starting with '_' to which access should never be allowed
99         <IfModule rewrite_module>
100                         RewriteEngine On
101                         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
102                         RewriteRule "(?x) ^/((?!r/)[^_].*/objects/(?: \
103                                 (?:[0-9a-f]{2}/[0-9a-f]{38}) | \
104                                 (?:pack/pack-[0-9a-f]{40}.(?:pack|idx)) ))$" \
105                                 @@reporoot@@/$1 [L]
106         </IfModule>
107         </IfDefine>
109         <IfDefine SmartHTTPOnly>
110         # Disable non-smart HTTP access
111         RewriteEngine On
112         RewriteCond %{REQUEST_METHOD} !^POST$
113         RewriteRule ^/r/.*(?<!/info/refs)$ - [F]
114         RewriteCond %{REQUEST_URI} !^/authrequired[.]cgi$
115         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
116         RewriteCond %{REQUEST_METHOD} !^POST$
117         RewriteRule ^/(?!r/).*(?<!/info/refs)$ - [F]
118         RewriteCond %{QUERY_STRING} !(^|&)service=git-(upload|receive)-pack(&|$)
119         RewriteRule ^/r/.*/info/refs$ - [F]
120         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
121         RewriteCond %{QUERY_STRING} !(^|&)service=git-(upload|receive)-pack(&|$)
122         RewriteRule ^/(?!r/).*/info/refs$ - [F]
123         </IfDefine>
125         # SetEnv GIT_HTTP_BACKEND_BIN to override Config.pm $git_http_backend_bin
126         # git-http-backend-verify denies all access to projects starting with '_'
127         ScriptAlias /r/ @@basedir@@/bin/git-http-backend-verify/
129         # This allows HTTP access for Git user agents without the /r/ prefix
130         <IfModule rewrite_module>
131                         RewriteEngine On
132                         RewriteCond %{REQUEST_URI} !^/authrequired[.]cgi$
133                         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
134                         RewriteRule ^/(?!r/)(.*)$ \
135                                 @@basedir@@/bin/git-http-backend-verify/$1 \
136                                 [L,H=cgi-script]
137         </IfModule>
139 </VirtualHost>
142 # This comments out the following so this file can be used as-is
143 <IfDefine DummyThatIsNotDefined>
146 # This is an example configuration of an https virtualhost running Girocco, as set
147 # up at repo.or.cz; unfortunately, completely independent from Girocco::Config.
148 # It is not essential for Girocco to use a special virtualhost, however.
149 # The Config.pm $httpspushurl variable needs to be defined to properly enable
150 # https pushing.
151 <VirtualHost *:443>
153         # These certificate files will all be automatically generated, but the
154         # paths here may need to be corrected to match the paths
155         # (especially $certsdir) from Config.pm
157         SSLCertificateFile @@certsdir@@/girocco_www_crt.pem
158         SSLCertificateKeyFile @@certsdir@@/girocco_www_key.pem
159         SSLCertificateChainFile @@certsdir@@/girocco_www_chain.pem
160         # when using a paid www server cert, only the above three lines should
161         # be changed.  Changing any of the below two lines (other than updating
162         # the paths to match $certsdir) will likely break https client auth
163         SSLCACertificateFile @@certsdir@@/girocco_root_crt.pem
164         SSLCADNRequestFile @@certsdir@@/girocco_client_crt.pem
166         SSLVerifyDepth 3
167         SSLOptions +FakeBasicAuth +StrictRequire
168         SSLEngine on
170         # This configuration allows fetching over https without a certificate
171         # while always requiring a certificate for pushing over https
172         RewriteEngine On
173         SSLVerifyClient optional
174         RewriteCond %{QUERY_STRING} (^|&)service=git-receive-pack(&|$)
175         RewriteRule ^/r/.*/info/refs$ - [env=client_auth_required:1]
176         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
177         RewriteCond %{QUERY_STRING} (^|&)service=git-receive-pack(&|$)
178         RewriteRule ^/(?!r/).*/info/refs$ - [env=client_auth_required:1]
179         RewriteRule ^/r/.*/git-receive-pack$ - [env=client_auth_required:1]
180         RewriteCond %{HTTP_USER_AGENT} git/ [NC]
181         RewriteRule ^/(?!r/).*/git-receive-pack$ - [env=client_auth_required:1]
182         RewriteCond %{ENV:client_auth_required} 1
183         RewriteCond %{SSL:SSL_CLIENT_VERIFY} !^SUCCESS$
184         RewriteRule .* %{REQUEST_URI} [R=401]
185         <Location />
186                 SSLRequireSSL
187                 Order deny,allow
188                 Deny from env=client_auth_required
189                 SSLOptions +FakeBasicAuth
190                 AuthName "Git Client Authentication"
191                 AuthType Basic
192                 AuthBasicProvider anon
193                 Anonymous *
194                 Require valid-user
195                 Satisfy any
196         </Location>
197         ErrorDocument 401 /authrequired.cgi
199         # *** IMPORTANT ***
200         #
201         # ALL the entire contents from the <VirtualHost *:80> section at
202         # the top of this file must be copied here.
203         #
204         # To avoid this duplication, the contents of the <VirtualHost *:80>
205         # section above can be moved to a separate file and then included
206         # both here and in the <VirtualHost *:80> section using an Include
207         # directive.  Be careful not to place the new include file in one of the
208         # directories the standard apache configuration blindly includes all
209         # files from.
211 </VirtualHost>
214 # End commenting
215 </IfDefine>