Hi folks,

Here at Heroku, we ingest code from users by supplying them with a Git server 
they can `git push` into. Occasionally, users will attempt to push to us from a 
shallow clone, which causes numerous problems for us and, often, for our users 
(incomplete repositories, gaps in history, failed builds, and a host of other 
problems). We’ve been investigating what we can do to give these users clearer 
advice on how to fix the problem.

Within the constraints that

* we cannot control which version of Git our users have installed, and
* we run Git v1.9.1, obtained from the Ubuntu 14.04 LTS .deb repositories

what can we do in an update/pre-receive hook to detect that an incoming push 
originates from a shallow repository and reject it?

Right now, the best strategy we have is to observe whether

    git rev-list OLD NEW

fails, and if it does fail, whether the stderr output includes the phrase 
"revision walk setup failed”. This feels like a fairly weak fix, so I thought 
I’d see if anyone here has a better idea.

Thanks,

-o

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to