Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Proposal] Drop git 1.x support, or fix the IsEmpty bug #19554

Closed
wxiaoguang opened this issue Apr 29, 2022 · 9 comments · Fixed by #19577
Closed

[Proposal] Drop git 1.x support, or fix the IsEmpty bug #19554

wxiaoguang opened this issue Apr 29, 2022 · 9 comments · Fixed by #19577
Labels
issue/confirmed Issue has been reviewed and confirmed to be present or accepted to be implemented type/proposal The new feature has not been accepted yet but needs to be discussed first.
Milestone

Comments

@wxiaoguang
Copy link
Contributor

wxiaoguang commented Apr 29, 2022

There is an obvious bug in Gitea that IsEmpty check always fails in git 1.x (git 1.x reports an error for that command), it makes many users only see empty repositories after they have pushed content in.

The only reason to support git 1.x IIRC is for CentOS 7.x users.

However, CentOS 7.x is quite old, and the users could always have other solutions: upgrade git (ius/wandisco/endpoint), or use docker to run Gitea.

Since Gitea is reaching 1.17, it's time to make the decision.

  • 👍 Drop git 1.x support
  • 🎉 [or] Fix the IsEmpty bug

I prefer to drop git 1.x support.

@wxiaoguang wxiaoguang added this to the 1.17.0 milestone Apr 29, 2022
@lafriks
Copy link
Member

lafriks commented Apr 29, 2022

I would also vote for dropping git 1.x support

@silverwind
Copy link
Member

We should probably define a minimum git version visibly in the docs and maybe emit a startup warning if it's too old. A good starter might be git 2.17 which is the latest upstream-supported version.

@wxiaoguang
Copy link
Contributor Author

@go-gitea/maintainers

It seems that this proposal gets votes for drop git 1.x support.

Any objection? If no objection, then we can move on.

@wxiaoguang wxiaoguang added the type/proposal The new feature has not been accepted yet but needs to be discussed first. label May 1, 2022
@lunny
Copy link
Member

lunny commented May 1, 2022

@go-gitea/maintainers

It seems that this proposal gets votes for drop git 1.x support.

Any objection? If no objection, then we can move on.

I update the issue content to add two emoji to make vote easier. :)

@wxiaoguang
Copy link
Contributor Author

wxiaoguang commented May 2, 2022

Since there is no objection (yet), so the PR comes, a very simple PR:


silverwind:

We should probably define a minimum git version visibly in the docs and maybe emit a startup warning if it's too old. A good starter might be git 2.17 which is the latest upstream-supported version.

Do you have some references about this information? I can not find the earliest supported git version.

@wxiaoguang wxiaoguang added the issue/confirmed Issue has been reviewed and confirmed to be present or accepted to be implemented label May 2, 2022
@silverwind
Copy link
Member

Do you have some references about this information? I can not find the earliest supported git version.

I was going off Wikipedia, not sure how accurate that info is, but the release dates seem to confirm it.

@wxiaoguang
Copy link
Contributor Author

Interesting .... I prefer maybe we do not need to hard-code these minor versions into code, without these detailed version, it reduces the maintenance workload, and gitea still works correctly. And there are a lot of git version check inside gitea, maybe they should be upgraded together in future.

@eeyrjmr
Copy link
Contributor

eeyrjmr commented May 2, 2022

One consideration for the minimum is any associated security issues
https://www.cvedetails.com/vulnerability-list/vendor_id-15815/product_id-33590/Git-scm-GIT.html

@wxiaoguang
Copy link
Contributor Author

One consideration for the minimum is any associated security issues https://www.cvedetails.com/vulnerability-list/vendor_id-15815/product_id-33590/Git-scm-GIT.html

Thank you for the suggestion. However, the 3rdparty security is not related to Gitea directly. For example, there are other softwares like Database, Cache, SSH even Linux Kernel may have security problem, but Gitea can not (and should not) cover all of them.

@go-gitea go-gitea locked and limited conversation to collaborators May 3, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
issue/confirmed Issue has been reviewed and confirmed to be present or accepted to be implemented type/proposal The new feature has not been accepted yet but needs to be discussed first.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants