}
-function gwvpmini_CreateRepoHooks($repopath, $cmdpath)
+function gwvpmini_CreateRepoHooks($repopath, $cmdpath, $reponame)
{
$fp = fopen("$repopath/hooks/pre-receive", "w");
- if(!$fp) // error_log("could not create pre-receive hook");
+ if(!$fp) error_log("could not create pre-receive hook");
// TODO: think about this one
- $script = '#!/bin/bash'."\n\n".'DCOMMIT=`cat`'."\n".'START=`echo $DCOMMIT|cut -d " " -f 1`'."\n".'END=`echo $DCOMMIT|cut -d " " -f 2`'."\n".'REF=`echo $DCOMMIT|cut -d " " -f 3`'."\n\n";
- $script .= "php $cmdpath pre-receive ";
- $script .= '$START $END $REF'."\n\n";
+ //$script = '#!/bin/bash'."\n\n".'DCOMMIT=`cat`'."\n".'START=`echo $DCOMMIT|cut -d " " -f 1`'."\n".'END=`echo $DCOMMIT|cut -d " " -f 2`'."\n".'REF=`echo $DCOMMIT|cut -d " " -f 3`'."\n\n";
+ $script = "#!/bin/bash\n\nDCOMMIT=".'`cat`'."\n\nphp $cmdpath $reponame \$REMOTE_USER pre-receive \$DCOMMIT\n\n";
fwrite($fp, $script);
fclose($fp);
$fp = fopen("$repopath/hooks/update", "w");
- if(!$fp) // error_log("could not create update hook");
+ if(!$fp) error_log("could not create update hook");
// TODO: think about this one
- $script = "#!/bin/bash\n\n";
- $script .= "php $cmdpath update ";
- $script .= '$1 $2 $3'."\n\n";
+ unset($script);
+ $script = "#!/bin/bash\n\nphp $cmdpath $reponame \$REMOTE_USER update \$1 \$2 \$3\n\n";
fwrite($fp, $script);
fclose($fp);
// error_log("FLAP: donut hole");
}*/
-
+ error_log("REQUESTINBACKEND: ".print_r($_REQUEST, true));
$repo = "";
$repoid = false;
if(!file_exists("$repo_base/$repo.git/hooks/pre-receive") || !file_exists("$repo_base/$repo.git/hooks/update")) {
// error_log("WRITING HOOKS");
- gwvpmini_CreateRepoHooks("$repo_base/$repo.git", $cmd_line_tool);
+ gwvpmini_CreateRepoHooks("$repo_base/$repo.git", $cmd_line_tool, $repo);
}
$write = true;
}
}
-
+ if(preg_match("/.*git-receive-pack$/", $_REQUEST["q"])) $write = true;
//$write = true;
// THIS MAY CAUSE ISSUES LATER ON but we do it cause the git client ignores our 403 when it uses git-receive-pack after an auth
// no, this isnt a solution cause auth'd read attempts will come up as writes...
}
// if its a write, we check (before and after) the branch/tag info to see if they were updated
- //if($write) {
- //}
+ if($write) {
+ error_log("REQUESTINBACKEND: processed as write");
+ } else {
+ error_log("REQUESTINBACKEND: processed as read");
+ }
gwvpmini_callGitBackend($person, $repo);
usleep(200000);
// error_log("sleep tick");
$stlimit++;
- if($stlimit > 2) $continue = false;
+ if($stlimit > 50) $continue = false;
} else {
$stlimit = 0;
// error_log("sizes: $client_len, $cgi_len");
// 0 - anyone can clone/read, only owner can write
// 1 - noone can clone/read, repo is visible (i.e. name), only owner can read/write repo
// 2 - only owner can see anything
-function gwvpmini_createGitRepo($name, $ownerid, $desc)
+function gwvpmini_createGitRepo($name, $ownerid, $desc, $clonefrom)
{
$repo_base = gwvpmini_getConfigVal("repodir");
+ if($clonefrom !== false) {
+
+ } else {
+
// phew, this works, but i tell you this - bundles arent quite as nice as they should be
// error_log("would create $repo_base/$name.git");
- exec("/usr/bin/git init $repo_base/$name.git --bare > /tmp/gitlog 2>&1");
- chdir("$repo_base/$name.git");
- exec("/usr/bin/git update-server-info");
-
- // gwvpmini_AddRepo($reponame, $repodesc, $repoowner, $defaultperms = 0)
- gwvpmini_AddRepo($name, $desc, $ownerid);
+ exec("/usr/bin/git init $repo_base/$name.git --bare > /tmp/gitlog 2>&1");
+ chdir("$repo_base/$name.git");
+ exec("/usr/bin/git update-server-info");
+
+ // gwvpmini_AddRepo($reponame, $repodesc, $repoowner, $defaultperms = 0)
+ gwvpmini_AddRepo($name, $desc, $ownerid, $clonefrom);
+ }
return true;
}