gitweb/git-browser: pick up updates to forbid restricted project names
[girocco.git] / install.sh
blob3bc7bdcb8fb1546266d6238f6abdea61bdc26da2
1 #!/bin/sh
2 # The Girocco installation script
3 # We will OVERWRITE basedir!
5 set -e
7 if [ -z "$MAKE" ]; then
8 echo "ERROR: MAKE not set" >&2
9 echo "Please run install.sh using 'make install'" >&2
10 echo "or set MAKE to the name of the GNU make executable" >&2
11 exit 1
14 # Run perl module checker
15 if [ ! -x toolbox/check-perl-modules.pl ]; then
16 echo "ERROR: missing toolbox/check-perl-modules.pl!" >&2
17 exit 1
19 toolbox/check-perl-modules.pl
21 # What Config should we use?
22 [ -n "$GIROCCO_CONF" ] || GIROCCO_CONF=Girocco::Config
23 echo "*** Initializing using $GIROCCO_CONF..."
25 # First run Girocco::Config consistency checks
26 perl -I. -M$GIROCCO_CONF -e ''
28 . ./shlib.sh
30 owngroup=""
31 [ -z "$cfg_owning_group" ] || owngroup=":$cfg_owning_group"
32 if [ -n "$cfg_httpspushurl" -a -z "$cfg_certsdir" ]; then
33 echo "ERROR: \$httpspushurl is set but \$certsdir is not!" >&2
34 echo "ERROR: perhaps you have an incorrect Config.pm?" >&2
35 exit 1
39 echo "*** Checking for compiled utilities..."
40 if [ ! -x src/can_user_push ]; then
41 echo "ERROR: src/can_user_push is not built! Did you _REALLY_ read INSTALL?" >&2
42 echo "ERROR: perhaps you forgot to run make?" >&2
43 exit 1
45 if [ ! -x src/can_user_push_http ]; then
46 echo "ERROR: src/can_user_push_http is not built! Did you _REALLY_ read INSTALL?" >&2
47 echo "ERROR: perhaps you forgot to run make?" >&2
48 exit 1
50 if [ ! -x src/getent ]; then
51 echo "ERROR: src/getent is not built! Did you _REALLY_ read INSTALL?" >&2
52 echo "ERROR: perhaps you forgot to run make?" >&2
53 exit 1
55 if [ ! -x src/get_user_uuid ]; then
56 echo "ERROR: src/get_user_uuid is not built! Did you _REALLY_ read INSTALL?" >&2
57 echo "ERROR: perhaps you forgot to run make?" >&2
58 exit 1
62 echo "*** Checking for ezcert..."
63 if [ ! -f ezcert.git/CACreateCert ]; then
64 echo "ERROR: ezcert.git is not checked out! Did you _REALLY_ read INSTALL?" >&2
65 exit 1
69 echo "*** Checking for git..."
70 if [ ! -x "$cfg_git_bin" ]; then
71 echo "ERROR: $cfg_git_bin does not exist or is not executable" >&2
72 exit 1
74 if ! git_version="$("$cfg_git_bin" --version)"; then
75 echo "ERROR: $cfg_git_bin --version failed" >&2
76 exit 1
78 case "$git_version" in
79 "git version "*) :;;
81 echo "ERROR: '$cfg_git_bin --version' output does not start with 'git version '" >&2
82 exit 1
83 esac
84 case "$cfg_git_bin" in /*) :;; *)
85 echo 'ERROR: $Girocco::Config::git_bin must be set to an absolute path' >&2
86 exit 1
87 esac
90 chown_make() {
91 if [ "$LOGNAME" = root -a -n "$SUDO_USER" -a "$SUDO_USER" != root ]; then
92 find "$@" -user root -print0 2>/dev/null | \
93 xargs $(: | xargs echo -r) -0 chown "$SUDO_USER:$(id -gn "$SUDO_USER")"
94 elif [ "$LOGNAME" = root -a -z "$SUDO_USER" -o "$SUDO_USER" = root ]; then
95 echo "*** WARNING: running make as root w/o sudo may leave root-owned: $*"
99 echo "*** Setting up basedir..."
100 "$MAKE" --no-print-directory --quiet apache.conf
101 chown_make apache.conf
102 "$MAKE" --no-print-directory --quiet -C src
103 chown_make src
104 rm -fr "$cfg_basedir"
105 mkdir -p "$cfg_basedir"
106 cp -pR Girocco jobd taskd gitweb html jobs toolbox hooks apache.conf shlib.sh bin screen "$cfg_basedir"
107 cp -p src/can_user_push src/can_user_push_http src/get_user_uuid ezcert.git/CACreateCert cgi/authrequired.cgi "$cfg_basedir/bin"
108 [ -n "$cfg_httpspushurl" ] || rm -f "$cfg_basedir"/html/rootcert.html "$cfg_basedir"/html/httpspush.html
109 [ -n "$cfg_mob" ] || rm -f "$cfg_basedir"/html/mob.html
111 # Put the correct Config in place
112 [ "$GIROCCO_CONF" = "Girocco::Config" ] || cp "$(echo "$GIROCCO_CONF" | sed 's#::#/#g; s/$/.pm/')" "$cfg_basedir/Girocco/Config.pm"
115 echo "*** Preprocessing scripts..."
116 perl -I. -M$GIROCCO_CONF -i -p \
117 -e 's/(?<!")\@basedir\@/"$Girocco::Config::basedir"/g;' \
118 -e 's/(?<=")\@basedir\@/$Girocco::Config::basedir/g;' \
119 -e 's/\@reporoot\@/"$Girocco::Config::reporoot"/g;' \
120 -e 's/\@jailreporoot\@/"$Girocco::Config::jailreporoot"/g;' \
121 -e 's/\@chroot\@/"$Girocco::Config::chroot"/g;' \
122 -e 's/\@webadmurl\@/"$Girocco::Config::webadmurl"/g;' \
123 -e 's/\@screen_acl_file\@/"$Girocco::Config::screen_acl_file"/g;' \
124 -e 's/\@mob\@/"$Girocco::Config::mob"/g;' \
125 -e 's/\@git_server_ua\@/"$Girocco::Config::git_server_ua"/g;' \
126 -e 's/\@defined_git_server_ua\@/defined($Girocco::Config::git_server_ua)/ge;' \
127 "$cfg_basedir"/jobs/*.sh "$cfg_basedir"/jobd/*.sh \
128 "$cfg_basedir"/taskd/*.sh "$cfg_basedir"/gitweb/*.sh \
129 "$cfg_basedir"/shlib.sh "$cfg_basedir"/hooks/* \
130 "$cfg_basedir"/toolbox/*.sh "$cfg_basedir"/toolbox/*.pl \
131 "$cfg_basedir"/toolbox/reports/*.sh \
132 "$cfg_basedir"/bin/git-* \
133 "$cfg_basedir"/bin/create-* "$cfg_basedir"/bin/update-* \
134 "$cfg_basedir"/bin/authrequired.cgi "$cfg_basedir"/screen/*
136 # Dump all the cfg_ and defined_ variables to shlib_vars.sh
137 get_girocco_config_var_list > "$cfg_basedir"/shlib_vars.sh
139 if [ -n "$cfg_mirror" ]; then
140 echo "--- Remember to start $cfg_basedir/taskd/taskd.pl"
142 echo "--- Also remember to either start $cfg_basedir/jobd/jobd.sh, or add this"
143 echo "--- to the crontab of $cfg_mirror_user (adjust frequency on number of repos):"
144 echo "*/30 * * * * /usr/bin/nice -n 18 $cfg_basedir/jobd/jobd.sh -q --all-once"
147 echo "*** Setting up repository root..."
148 mkdir -p "$cfg_reporoot" "$cfg_reporoot-recyclebin"
149 if [ "$cfg_owning_group" ]; then
150 chgrp "$cfg_owning_group" "$cfg_reporoot" || echo "WARNING: Cannot chgrp $cfg_owning_group $cfg_reporoot"
151 chgrp "$cfg_owning_group" "$cfg_reporoot-recyclebin" || echo "WARNING: Cannot chgrp $cfg_owning_group $cfg_reporoot-recyclebin"
153 chmod 02775 "$cfg_reporoot" || echo "WARNING: Cannot chmod $cfg_reporoot properly"
154 chmod 02775 "$cfg_reporoot-recyclebin" || echo "WARNING: Cannot chmod $cfg_reporoot-recyclebin properly"
157 if [ -n "$cfg_chrooted" ]; then
158 echo "*** Setting up chroot jail for pushing..."
159 if [ "$(id -u)" -eq 0 ]; then
160 ./jailsetup.sh
161 else
162 echo "WARNING: Skipping jail setup, not root"
167 echo "*** Setting up jail configuration (project database)..."
168 [ "$(id -u)" -eq 0 ] || ./jailsetup.sh dbonly
169 mkdir -p "$cfg_chroot" "$cfg_chroot/etc"
170 touch "$cfg_chroot/etc/passwd" "$cfg_chroot/etc/group"
171 chown "$cfg_mirror_user""$owngroup" "$cfg_chroot/etc" ||
172 echo "WARNING: Cannot chown $cfg_mirror_user$owngroup $cfg_chroot/etc"
173 chown "$cfg_cgi_user""$owngroup" "$cfg_chroot/etc/passwd" "$cfg_chroot/etc/group" ||
174 echo "WARNING: Cannot chown $cfg_cgi_user$owngroup the files"
175 chmod g+w "$cfg_chroot/etc/passwd" "$cfg_chroot/etc/group" ||
176 echo "WARNING: Cannot chmod g+w the etc/passwd and/or etc/group files"
177 chmod 02775 "$cfg_chroot/etc" || echo "WARNING: Cannot chmod 02775 $cfg_chroot/etc"
179 echo "*** Setting up gitweb from git.git..."
180 if [ ! -f git.git/Makefile ]; then
181 echo "ERROR: git.git is not checked out! Did you _REALLY_ read INSTALL?" >&2
182 exit 1
184 mkdir -p "$cfg_webroot" "$cfg_cgiroot"
185 (cd git.git && "$MAKE" --no-print-directory --quiet NO_SUBDIR=: bindir="$(dirname "$cfg_git_bin")" gitweb && \
186 chown_make gitweb && \
187 cp gitweb/gitweb.cgi "$cfg_cgiroot" && \
188 cp gitweb/static/*.png gitweb/static/*.css gitweb/static/*.js "$cfg_webroot")
191 echo "*** Setting up git-browser from git-browser.git..."
192 if [ ! -f git-browser.git/git-browser.cgi ]; then
193 echo "ERROR: git-browser.git is not checked out! Did you _REALLY_ read INSTALL?" >&2
194 exit 1
196 mkdir -p "$cfg_webroot"/git-browser "$cfg_cgiroot"
197 (cd git-browser.git && cp git-browser.cgi "$cfg_cgiroot" \
198 && cp -r *.html *.js *.css js.lib JSON "$cfg_webroot"/git-browser)
199 ln -sf "$cfg_webroot/git-browser/JSON" "$cfg_cgiroot"
200 cat >"$cfg_cgiroot"/git-browser.conf <<EOT
201 gitbin: $cfg_git_bin
202 warehouse: $cfg_reporoot
204 cat >"$cfg_webroot"/git-browser/GitConfig.js <<EOT
205 cfg_gitweb_url="$cfg_gitweburl/"
206 cfg_browsercgi_url="$cfg_webadmurl/git-browser.cgi"
210 echo "*** Setting up darcs-fast-export from bzr-fastimport.git..."
211 if [ ! -d bzr-fastimport.git/exporters/darcs/ ]; then
212 echo "ERROR: bzr-fastimport.git is not checked out! Did you _REALLY_ read INSTALL?" >&2
213 exit 1
215 mkdir -p "$cfg_basedir"/bin
216 cp bzr-fastimport.git/exporters/darcs/darcs-fast-export "$cfg_basedir"/bin
219 echo "*** Setting up hg-fast-export from fast-export.git..."
220 if [ ! -f fast-export.git/hg-fast-export.py -o ! -f fast-export.git/hg2git.py ]; then
221 echo "ERROR: fast-export.git is not checked out! Did you _REALLY_ read INSTALL?" >&2
222 exit 1
224 mkdir -p "$cfg_basedir"/bin
225 cp fast-export.git/hg-fast-export.py fast-export.git/hg2git.py "$cfg_basedir"/bin
228 echo "*** Setting up our part of the website..."
229 mkdir -p "$cfg_webroot" "$cfg_cgiroot"
230 cp cgi/*.cgi gitweb/gitweb_config.perl "$cfg_cgiroot"
231 rm -f "$cfg_cgiroot"/authrequired.cgi
232 [ -z "$cfg_httpspushurl" ] || cp "$cfg_basedir"/bin/authrequired.cgi "$cfg_cgiroot"
233 [ -n "$cfg_httpspushurl" ] || rm -f "$cfg_cgiroot"/usercert.cgi
234 ln -fs "$cfg_basedir"/Girocco "$cfg_cgiroot"
235 [ -z "$cfg_webreporoot" ] || { rm -f "$cfg_webreporoot" && ln -s "$cfg_reporoot" "$cfg_webreporoot"; }
236 if [ -z "$cfg_httpspushurl" ]; then
237 grep -v 'rootcert[.]html' gitweb/indextext.html > "$cfg_webroot/indextext.html"
238 else
239 cp gitweb/indextext.html "$cfg_webroot"
241 mv "$cfg_basedir"/html/*.css "$cfg_basedir"/html/*.js "$cfg_webroot"
242 cp mootools.js "$cfg_webroot"
243 cp htaccess "$cfg_webroot/.htaccess"
244 cp git-favicon.ico "$cfg_webroot/favicon.ico"
245 cp robots.txt "$cfg_webroot"
246 cat gitweb/gitweb.css >>"$cfg_webroot"/gitweb.css
249 if [ -n "$cfg_httpspushurl" ]; then
250 echo "*** Setting up SSL certificates..."
251 bits=2048
252 if [ "$cfg_rsakeylength" -gt "$bits" ] 2>/dev/null; then
253 bits="$cfg_rsakeylength"
255 mkdir -p "$cfg_certsdir"
256 [ -d "$cfg_certsdir" ]
257 wwwcertcn=
258 if [ -e "$cfg_certsdir/girocco_www_crt.pem" ]; then
259 wwwcertcn="$( \
260 openssl x509 -in "$cfg_certsdir/girocco_www_crt.pem" -noout -subject | \
261 sed -e 's,[^/]*,,' \
264 needroot=
265 [ -e "$cfg_certsdir/girocco_client_crt.pem" -a \
266 -e "$cfg_certsdir/girocco_client_key.pem" -a \
267 -e "$cfg_certsdir/girocco_www_key.pem" -a \
268 -e "$cfg_certsdir/girocco_www_crt.pem" -a "$wwwcertcn" = "/CN=$cfg_httpsdnsname" -a \
269 -e "$cfg_certsdir/girocco_root_crt.pem" ] || needroot=1
270 if [ -n "$needroot" -a ! -e "$cfg_certsdir/girocco_root_key.pem" ]; then
271 rm -f "$cfg_certsdir/girocco_root_crt.pem" "$cfg_certsdir/girocco_root_key.pem"
272 openssl genrsa -f4 -out "$cfg_certsdir/girocco_root_key.pem" $bits
273 chmod 0600 "$cfg_certsdir/girocco_root_key.pem"
274 rm -f "$cfg_certsdir/girocco_root_crt.pem"
275 echo "Created new root key"
277 if [ ! -e "$cfg_certsdir/girocco_root_crt.pem" ]; then
278 ezcert.git/CACreateCert --root --key "$cfg_certsdir/girocco_root_key.pem" \
279 --out "$cfg_certsdir/girocco_root_crt.pem" "girocco $cfg_nickname root certificate"
280 rm -f "$cfg_certsdir/girocco_www_crt.pem" "$cfg_certsdir/girocco_www_chain.pem"
281 rm -f "$cfg_certsdir/girocco_client_crt.pem" "$cfg_certsdir/girocco_client_suffix.pem"
282 rm -f "$cfg_certsdir/girocco_mob_user_crt.pem"
283 rm -f "$cfg_chroot/etc/sshcerts"/*.pem
284 echo "Created new root certificate"
286 if [ ! -e "$cfg_certsdir/girocco_www_key.pem" ]; then
287 openssl genrsa -f4 -out "$cfg_certsdir/girocco_www_key.pem" $bits
288 chmod 0600 "$cfg_certsdir/girocco_www_key.pem"
289 rm -f "$cfg_certsdir/girocco_www_crt.pem"
290 echo "Created new www key"
292 if [ ! -e "$cfg_certsdir/girocco_www_crt.pem" -o "$wwwcertcn" != "/CN=$cfg_httpsdnsname" ]; then
293 openssl rsa -in "$cfg_certsdir/girocco_www_key.pem" -pubout |
294 ezcert.git/CACreateCert --server --key "$cfg_certsdir/girocco_root_key.pem" \
295 --cert "$cfg_certsdir/girocco_root_crt.pem" \
296 --out "$cfg_certsdir/girocco_www_crt.pem" "$cfg_httpsdnsname"
297 echo "Created www certificate"
299 if [ ! -e "$cfg_certsdir/girocco_www_chain.pem" ]; then
300 cat "$cfg_certsdir/girocco_root_crt.pem" > "$cfg_certsdir/girocco_www_chain.pem"
301 echo "Created www certificate chain file"
303 if [ ! -e "$cfg_certsdir/girocco_client_key.pem" ]; then
304 openssl genrsa -f4 -out "$cfg_certsdir/girocco_client_key.pem" $bits
305 chmod 0640 "$cfg_certsdir/girocco_client_key.pem"
306 rm -f "$cfg_certsdir/girocco_client_crt.pem"
307 echo "Created new client key"
309 if [ ! -e "$cfg_certsdir/girocco_client_crt.pem" ]; then
310 openssl rsa -in "$cfg_certsdir/girocco_client_key.pem" -pubout |
311 ezcert.git/CACreateCert --subca --key "$cfg_certsdir/girocco_root_key.pem" \
312 --cert "$cfg_certsdir/girocco_root_crt.pem" \
313 --out "$cfg_certsdir/girocco_client_crt.pem" "girocco $cfg_nickname client authority"
314 rm -f "$cfg_certsdir/girocco_client_suffix.pem"
315 rm -f "$cfg_certsdir/girocco_mob_user_crt.pem"
316 rm -f "$cfg_chroot/etc/sshcerts"/*.pem
317 echo "Created client certificate"
319 if [ ! -e "$cfg_certsdir/girocco_client_suffix.pem" ]; then
320 cat "$cfg_certsdir/girocco_client_crt.pem" > "$cfg_certsdir/girocco_client_suffix.pem"
321 echo "Created client certificate suffix file"
323 cat "$cfg_rootcert" > "$cfg_webroot/${cfg_nickname}_root_cert.pem"
324 if [ -n "$cfg_mob" ]; then
325 if [ ! -e "$cfg_certsdir/girocco_mob_user_key.pem" ]; then
326 openssl genrsa -f4 -out "$cfg_certsdir/girocco_mob_user_key.pem" $bits
327 chmod 0640 "$cfg_certsdir/girocco_client_key.pem"
328 rm -f "$cfg_certsdir/girocco_mob_user_crt.pem"
329 echo "Created new mob user key"
331 if [ ! -e "$cfg_certsdir/girocco_mob_user_crt.pem" ]; then
332 openssl rsa -in "$cfg_mobuserkey" -pubout |
333 ezcert.git/CACreateCert --client --key "$cfg_clientkey" \
334 --cert "$cfg_clientcert" \
335 --out "$cfg_certsdir/girocco_mob_user_crt.pem" 'mob'
336 echo "Created mob user client certificate"
338 cat "$cfg_mobuserkey" > "$cfg_webroot/${cfg_nickname}_mob_key.pem"
339 cat "$cfg_mobusercert" "$cfg_clientcertsuffix" > "$cfg_webroot/${cfg_nickname}_mob_user.pem"
340 else
341 rm -f "$cfg_webroot/${cfg_nickname}_mob_key.pem" "$cfg_webroot/${cfg_nickname}_mob_user.pem"
343 else
344 rm -f "$cfg_webroot/${cfg_nickname}_root_cert.pem"
345 rm -f "$cfg_webroot/${cfg_nickname}_mob_key.pem" "$cfg_webroot/${cfg_nickname}_mob_user.pem"
349 echo "*** Finalizing permissions..."
350 chown -R -h "$cfg_mirror_user""$owngroup" "$cfg_basedir" "$cfg_webroot" "$cfg_cgiroot"
351 [ -z "$cfg_httpspushurl" ] || chown -R -h "$cfg_mirror_user""$owngroup" "$cfg_certsdir"