Ævar Arnfjörð Bjarmason <avarab@xxxxxxxxx> 于2022年7月28日周四 23:59写道: > > > On Thu, Jul 28 2022, ZheNing Hu wrote: > > > Ævar Arnfjörð Bjarmason <avarab@xxxxxxxxx> 于2022年7月27日周三 17:20写道: > >> > >> > >> On Wed, Jul 27 2022, ZheNing Hu wrote: > >> > >> > if there is a monorepo such as > >> > git@xxxxxxxxxx:derrickstolee/sparse-checkout-example.git > >> > > >> > There are many files and directories: > >> > > >> > client/ > >> > android/ > >> > electron/ > >> > iOS/ > >> > service/ > >> > common/ > >> > identity/ > >> > list/ > >> > photos/ > >> > web/ > >> > browser/ > >> > editor/ > >> > friends/ > >> > boostrap.sh > >> > LICENSE.md > >> > README.md > >> > > >> > Now we can use partial-clone + sparse-checkout to reduce > >> > the network overhead, and reduce disk storage space size, that's good. > >> > > >> > But I also need a ACL to control what directory or file people can fetch/push. > >> > e.g. I don't want a client fetch the code in "service" or "web". > >> > > >> > Now if the user client use "git log -p" or "git sparse-checkout add service"... > >> > or other git command, git which will download them by > >> > "git fetch --filter=blob:none --stdin <oid>" automatically. > >> > > >> > This means that the git client and server interact with git objects > >> > (and don't care about path) we cannot simply ban someone download > >> > a "path" on the server side. > >> > > >> > What should I do? You may recommend me to use submodule, > >> > but due to its complexity, I don't really want to use it :-( > >> > >> There isn't a way to do this in git. > >> > >> It's theoretically possible, i.e. a client could be told that the SHA-1 > >> of a directory is XYZ, and construct a commit object with a reference to > >> it. > >> > > > > I guess you mean use a special reference to hold the restricted path which > > the client can access, and pre-receive-hook can ban the client from downloading > > other references. But this method is a little weird... How can this reference > > sync with main branches? If we have changed client permission to access > > server directory, how to get the "history" of the server directory? > > > > I believe this approach is not very appropriate and is not maintainable. > > It's not maintainable at all, and I don't believe any current git client > supports this. > > But due to git's commits referring to a Merkle tree I can tell you that > a subdirectory "secret" has a current tree SHA-1 of XYZ, without giving > you any of that content. > > You *could* then manually construct a commit like: > > tree <NEW_TREE> > ... > > Where the "<NEW_TREE>" would be a tree like: > > 100644 blob <NEW-BLOB-SHA1> UPDATED.md > 040000 tree <XYZ> secret-stuff > > And send you a PACK with my new two three new objects (commit, blob & > new top-level NEW_TREE). To the remote end & protocol it wouldn't be > distinguishable from a "normal" push. > > But nothing supports this already, as a practical matter most of git > either hard dies if content is missing, or has other odd edge-case > semantics (and I'm not up-to-date on the state of the art). > > Anyway, just saying that for the longer term I'm not aware of an > *intrinsic* reason for why we couldn't support this sort of thing, in > case anyone's interested in putting in a *lot* of leg work to make it > happen. > As Newren said, this is just like what sparse-index does. I use partial clone + sparse-checkout + sparse-index to do git add/git commit, git can add and commit correctly without fetching any excess objects. But we can't prevent users from downloading other directories or files. > >> But currently a *lot* of things in the client code assume that these > >> things will be available in one way or another. > >> > >> The state-of-the-art in the "sparse" code may differ from the above, I > >> don't know. > >> > >> Also note that there's a well-known edge case in the git protocol where > >> it's really incompatible with the notion of "secret" data, i.e. even if > >> you hide a ref you'll be able to "guess" it by seeing what delta(s) the > >> server will produce or accept etc. > > > > Yeah, there are data security issues... Unless we need to isolate objects > > between directories. Or in this case we disable the delta object..... > > Okay, this seems a little strange. > > You can't really just "disable the delta(s)". Well, you can in > principle, but like what I outlined above it's one of those things > that's a far way off, and it's one thing to e.g. have a client that's > able to craft a commit referring to data it doesn't have. > > It's quite another to secure a server in such a way that it can serve up > secret data from the repo to some clients, but not to others. > All right... I might have to think of something else. > I can imagine some hacks to make that happen, but I won't go into that > here... ZheNing Hu