summaryrefslogtreecommitdiff
path: root/bin/gitano-pre-receive-hook.in
blob: a81f892583c6d774db6f22c9fe5c4bd59e4e0735 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
-- @@SHEBANG
-- -*- Lua -*-
-- gitano-pre-receive-hook
--
-- Git (with) Augmented network operations -- pre-receive hook handler
--
-- Copyright 2012-2017 Daniel Silverstone <dsilvers@digital-scurf.org>
-- All rights reserved.
--
-- Redistribution and use in source and binary forms, with or without
-- modification, are permitted provided that the following conditions
-- are met:
-- 1. Redistributions of source code must retain the above copyright
--    notice, this list of conditions and the following disclaimer.
-- 2. Redistributions in binary form must reproduce the above copyright
--    notice, this list of conditions and the following disclaimer in the
--    documentation and/or other materials provided with the distribution.
-- 3. Neither the name of the author nor the names of their contributors
--    may be used to endorse or promote products derived from this software
--    without specific prior written permission.
--
-- THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-- ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-- SUCH DAMAGE.
--
--

-- @@GITANO_LUA_PATH

local gitano = require "gitano"
local pat = gitano.patterns
local gall = require "gall"
local luxio = require "luxio"
local sio = require "luxio.simple"
local sp = require "luxio.subprocess"

-- @@GITANO_BIN_PATH
-- @@GITANO_SHARE_PATH
-- @@GITANO_I18N_PATH
-- @@GITANO_PLUGIN_PATH

local start_log_level = gitano.log.get_level()
-- Clamp level at info until we have checked if the caller
-- is an admin or not
gitano.log.cap_level(gitano.log.level.INFO)
gitano.log.syslog.open()

local repo_root = luxio.getenv("GITANO_ROOT")
local username  = luxio.getenv("GITANO_USER") or "gitano/anonymous"
local keytag    = luxio.getenv("GITANO_KEYTAG") or "unknown"
local project   = luxio.getenv("GITANO_PROJECT") or ""
local source    = luxio.getenv("GITANO_SOURCE") or "ssh"
local running   = luxio.getenv("GITANO_RUNNING")

-- Check whether we are called through gitano-auth
if not running then
   return 0
end

-- Now load the administration data
gitano.config.repo_path(repo_root)
local admin_repo = gall.repository.new((repo_root or "") .. "/gitano-admin.git")

if not admin_repo then
   gitano.log.fatal(gitano.i18n.expand("ERROR_NO_ADMIN_REPO"));
end

local admin_head = admin_repo:get(admin_repo.HEAD)

if not admin_head then
   gitano.log.fatal(gitano.i18n.expand("ERROR_BAD_ADMIN_REPO"));
end

local config, msg = gitano.config.parse(admin_head)

if not config then
   gitano.log.critical(gitano.i18n.expand("ERROR_CANNOT_PARSE_ADMIN"))
   gitano.log.critical("  * " .. (msg or "No error?"))
   gitano.log.fatal(gitano.i18n.expand("ERROR_CANNOT_CONTINUE"))
end

-- Now, are we an admin?
if config.groups["gitano-admin"].filtered_members[username] then
   -- Yep, so blithely reset logging level
   gitano.log.set_level(start_log_level)
end

if not config.global.silent then
   -- Not silent, bump to chatty level automatically
   gitano.log.bump_level(gitano.log.level.CHAT)
end

local repo, msg = gitano.repository.find(config, project)
if not repo then
   gitano.log.critical(gitano.i18n.expand("ERROR_CANNOT_LOCATE_REPO"))
   gitano.log.critical("  * " .. (tostring(msg)))
   gitano.log.fatal(gitano.i18n.expand("ERROR_CANNOT_CONTINUE"))
end

if repo.is_nascent then
   gitano.log.fatal(gitano.i18n.expand("ERROR_REPO_IS_NASCENT", {name=repo.name}))
end

-- pre-receive can prevent updates. Its name is a bit misleading.
-- pre-receive is called once all the objects have been pushed, but before the
-- individual update hooks are called.  It gets the same input as post-receive
-- but can opt to reject the entire push.  If you need to make decisions based
-- upon multiple refs being updated simultaneously, then this is the badger for
-- you.

local updates = {}
for oldsha, newsha, refname in (sio.stdin:read("*a")):gmatch(pat.GITHOOK_PARSE_CHANGESET) do
   gitano.log.ddebug("pre-receive:", oldsha, newsha, refname)
   updates[refname] = {oldsha, newsha, oldsha=oldsha, newsha=newsha}
end

if repo:uses_hook("pre-receive") then
   gitano.log.debug("Configuring for pre-receive hook")
   gitano.actions.set_supple_globals("pre-receive")

   local msg = gitano.i18n.expand("RUNNING_PRE_RECEIVE_HOOK")

   gitano.log.info(msg)
   gitano.log.syslog.info(msg)

   local info = {
      username = username,
      keytag = keytag,
      source = source,
      realname = (config.users[username] or {}).real_name or "",
      email = (config.users[username] or {}).email_address or "",
   }
   local ok, msg = gitano.supple.run_hook("pre-receive", repo, info, updates)
   if not ok then
      gitano.log.crit(msg or gitano.i18n.expand("ERROR_NO_ERROR_FOUND"))
   end
   gitano.log.info(gitano.i18n.expand("FINISHED"))
end

gitano.log.syslog.close()

return 0