mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-12-24 21:38:07 -05:00
gnu: Modify the gitolite package to support the Guix service.
Previously the gitolite package worked, but there were problems using it for the service where you might have a minimal PATH. This commit patches the source and scripts where possible to use store paths, and also wraps the gitolite script to handle the harder dependencies. * gnu/packages/version-control.scm (gitolite)[arguments]: Add more patching to the patch-scripts phase, and add two new phases (patch-source and wrap-scripts). [inputs]: Add coreutils, findutils and inetutils.
This commit is contained in:
parent
02817df07e
commit
595af457ae
1 changed files with 52 additions and 1 deletions
|
@ -1031,12 +1031,48 @@ (define-public gitolite
|
|||
((" perl -")
|
||||
(string-append " " perl " -")))
|
||||
|
||||
(substitute* (find-files "src/triggers" ".*")
|
||||
((" sed ")
|
||||
(string-append " " (which "sed") " ")))
|
||||
|
||||
(substitute*
|
||||
'("src/triggers/post-compile/update-gitweb-access-list"
|
||||
"src/triggers/post-compile/ssh-authkeys-split"
|
||||
"src/triggers/upstream")
|
||||
((" grep ")
|
||||
(string-append " " (which "grep") " ")))
|
||||
|
||||
;; Avoid references to the store in authorized_keys.
|
||||
;; This works because gitolite-shell is in the PATH.
|
||||
(substitute* "src/triggers/post-compile/ssh-authkeys"
|
||||
(("\\$glshell \\$user")
|
||||
"gitolite-shell $user"))
|
||||
#t)))
|
||||
(add-before 'install 'patch-source
|
||||
(lambda* (#:key inputs #:allow-other-keys)
|
||||
;; Gitolite uses cat to test the readability of the
|
||||
;; pubkey
|
||||
(substitute* "src/lib/Gitolite/Setup.pm"
|
||||
(("\"cat ")
|
||||
(string-append "\"" (which "cat") " "))
|
||||
(("\"ssh-keygen")
|
||||
(string-append "\"" (which "ssh-keygen"))))
|
||||
|
||||
(substitute* '("src/lib/Gitolite/Hooks/PostUpdate.pm"
|
||||
"src/lib/Gitolite/Hooks/Update.pm")
|
||||
(("/usr/bin/perl")
|
||||
(string-append (assoc-ref inputs "perl")
|
||||
"/bin/perl")))
|
||||
|
||||
(substitute* "src/lib/Gitolite/Common.pm"
|
||||
(("\"ssh-keygen")
|
||||
(string-append "\"" (which "ssh-keygen")))
|
||||
(("\"logger\"")
|
||||
(string-append "\""
|
||||
(assoc-ref inputs "inetutils")
|
||||
"/bin/logger\"")))
|
||||
|
||||
#t))
|
||||
(replace 'install
|
||||
(lambda* (#:key outputs #:allow-other-keys)
|
||||
(let* ((output (assoc-ref outputs "out"))
|
||||
|
@ -1050,9 +1086,24 @@ (define-public gitolite
|
|||
(symlink (string-append sharedir "/" script)
|
||||
(string-append bindir "/" script)))
|
||||
'("gitolite" "gitolite-shell"))
|
||||
#t)))
|
||||
(add-after 'install 'wrap-scripts
|
||||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||||
(let ((out (assoc-ref outputs "out"))
|
||||
(coreutils (assoc-ref inputs "coreutils"))
|
||||
(findutils (assoc-ref inputs "findutils"))
|
||||
(git (assoc-ref inputs "git")))
|
||||
(wrap-program (string-append out "/bin/gitolite")
|
||||
`("PATH" ":" prefix
|
||||
,(map (lambda (dir)
|
||||
(string-append dir "/bin"))
|
||||
(list out coreutils findutils git))))
|
||||
#t))))))
|
||||
(inputs
|
||||
`(("perl" ,perl)))
|
||||
`(("perl" ,perl)
|
||||
("coreutils" ,coreutils)
|
||||
("findutils" ,findutils)
|
||||
("inetutils" ,inetutils)))
|
||||
;; git and openssh are propagated because trying to patch the source via
|
||||
;; regexp matching is too brittle and prone to false positives.
|
||||
(propagated-inputs
|
||||
|
|
Loading…
Reference in a new issue