2020-07-29 19:23:18 +00:00
|
|
|
When a file is annexed, a [[key|internals/key_format]] is generated from
|
|
|
|
its content and/or filesystem metadata. The file checked into git symlinks
|
|
|
|
to the key. This key can later be used to retrieve the file's content (its
|
|
|
|
value).
|
2010-10-19 19:59:40 +00:00
|
|
|
|
2020-07-29 19:23:18 +00:00
|
|
|
Multiple key-value backends are supported, and a single repository
|
2017-02-25 00:03:36 +00:00
|
|
|
can use different ones for different files.
|
|
|
|
|
2020-07-29 19:23:18 +00:00
|
|
|
## configuring which backend to use
|
|
|
|
|
|
|
|
The `annex.backend` git-config setting can be used to configure the
|
|
|
|
default backend to use when adding new files.
|
|
|
|
|
|
|
|
For finer control of what backend is used when adding different types of
|
|
|
|
files, the `.gitattributes` file can be used. The `annex.backend`
|
|
|
|
attribute can be set to the name of the backend to use for matching files.
|
|
|
|
|
|
|
|
For example, to use the SHA256E backend for sound files, which tend to be
|
|
|
|
smallish and might be modified or copied over time,
|
|
|
|
while using the WORM backend for everything else, you could set
|
|
|
|
in `.gitattributes`:
|
|
|
|
|
|
|
|
* annex.backend=WORM
|
|
|
|
*.mp3 annex.backend=SHA256E
|
|
|
|
*.ogg annex.backend=SHA256E
|
|
|
|
|
|
|
|
## recommended backends to use
|
2011-03-28 02:52:13 +00:00
|
|
|
|
2014-07-16 17:31:01 +00:00
|
|
|
* `SHA256E` -- The default backend for new files, combines a 256 bit SHA-2
|
|
|
|
hash of the file's content with the file's extension. This allows
|
2011-08-29 16:08:54 +00:00
|
|
|
verifying that the file content is right, and can avoid duplicates of
|
|
|
|
files with the same content. Its need to generate checksums
|
2011-11-04 19:21:45 +00:00
|
|
|
can make it slower for large files.
|
2015-08-06 19:02:25 +00:00
|
|
|
* `SHA256` -- SHA-2 hash that does not include the file extension in the
|
|
|
|
key, which can lead to better deduplication but can confuse some programs.
|
2014-07-16 17:31:01 +00:00
|
|
|
* `SHA512`, `SHA512E` -- Best SHA-2 hash, for the very paranoid.
|
2015-08-06 19:02:25 +00:00
|
|
|
* `SHA384`, `SHA384E`, `SHA224`, `SHA224E` -- SHA-2 hashes for
|
|
|
|
people who like unusual sizes.
|
2015-08-13 02:19:11 +00:00
|
|
|
* `SHA3_512`, `SHA3_512E`, `SHA3_384`, `SHA3_384E`, `SHA3_256`, `SHA3_256E`, `SHA3_224`, `SHA3_224E`
|
2015-08-06 19:02:25 +00:00
|
|
|
-- SHA-3 hashes, for bleeding edge fun.
|
2014-07-16 17:31:01 +00:00
|
|
|
* `SKEIN512`, `SKEIN512E`, `SKEIN256`, `SKEIN256E`
|
|
|
|
-- [Skein hash](http://en.wikipedia.org/wiki/Skein_hash),
|
2013-10-02 00:34:06 +00:00
|
|
|
a well-regarded SHA3 hash competition finalist.
|
2018-03-13 20:15:35 +00:00
|
|
|
* `BLAKE2B160`, `BLAKE2B224`, `BLAKE2B256`, `BLAKE2B384`, `BLAKE2B512`
|
|
|
|
`BLAKE2B160E`, `BLAKE2B224E`, `BLAKE2B256E`, `BLAKE2B384E`, `BLAKE2B512E`
|
|
|
|
-- Fast [Blake2 hash](https://blake2.net/) variants optimised for 64 bit
|
|
|
|
platforms.
|
|
|
|
* `BLAKE2S160`, `BLAKE2S224`, `BLAKE2S256`
|
|
|
|
`BLAKE2S160E`, `BLAKE2S224E`, `BLAKE2S256E`
|
|
|
|
-- Fast [Blake2 hash](https://blake2.net/) variants optimised for 32 bit
|
|
|
|
platforms.
|
2019-07-05 19:29:00 +00:00
|
|
|
* `BLAKE2BP512`, `BLAKE2BP512E`
|
|
|
|
-- Fast [Blake2 hash](https://blake2.net/) variants optimised for
|
|
|
|
4-way CPUs.
|
2018-03-13 20:15:35 +00:00
|
|
|
* `BLAKE2SP224`, `BLAKE2SP256`
|
|
|
|
`BLAKE2SP224E`, `BLAKE2SP256E`
|
|
|
|
-- Fast [Blake2 hash](https://blake2.net/) variants optimised for
|
|
|
|
8-way CPUs.
|
2017-02-25 00:03:36 +00:00
|
|
|
|
2020-07-29 19:23:18 +00:00
|
|
|
## non-cryptograpgically secure backends
|
|
|
|
|
2017-02-25 00:03:36 +00:00
|
|
|
The backends below do not guarantee cryptographically that the
|
|
|
|
content of an annexed file remains unchanged.
|
|
|
|
|
2015-08-06 19:02:25 +00:00
|
|
|
* `SHA1`, `SHA1E`, `MD5`, `MD5E` -- Smaller hashes than `SHA256`
|
|
|
|
for those who want a checksum but are not concerned about security.
|
|
|
|
* `WORM` ("Write Once, Read Many") -- This assumes that any file with
|
|
|
|
the same filename, size, and modification time has the same content.
|
|
|
|
This is the least expensive backend, recommended for really large
|
|
|
|
files or slow systems.
|
|
|
|
* `URL` -- This is a key that is generated from the url to a file.
|
|
|
|
It's generated when using eg, `git annex addurl --fast`, when the file
|
2018-10-12 20:28:25 +00:00
|
|
|
content is not available for hashing. The key may not contain the full
|
|
|
|
URL; for long URLs, part of the URL may be represented by a checksum.
|
|
|
|
The URL key may contain `&` characters; be sure to quote the key if
|
|
|
|
passing it to a shell script. The URL-backend key is distinct from URLs/URIs
|
|
|
|
that may be attached to a key (from any backend) indicating the key's location
|
|
|
|
on the web or in one of [[special_remotes]].
|
2011-03-28 02:52:13 +00:00
|
|
|
|
2020-07-29 19:23:18 +00:00
|
|
|
## external backends
|
|
|
|
|
|
|
|
While most backends are built into git-annex, it also supports external
|
|
|
|
backends. These are programs with names like `git-annex-backend-XFOO`,
|
|
|
|
which can be provided by others. See [[design/external_backend_protocol]]
|
|
|
|
for details about how to write them.
|
|
|
|
|
|
|
|
Here's a list of external backends. Edit this page to add yours to the list.
|
|
|
|
|
|
|
|
* [[design/external_backend_protocol/git-annex-backend-XFOO]]
|
|
|
|
is a demo program implementing the protocol with a shell script.
|
|
|
|
|
2020-07-29 21:12:22 +00:00
|
|
|
Like with git-annex's builtin backends, you can add "E" to the end of the
|
|
|
|
name of an external backend, to get a version that includes the file
|
|
|
|
extension in the key.
|
|
|
|
|
2020-07-29 19:23:18 +00:00
|
|
|
## notes
|
|
|
|
|
2017-02-25 00:03:36 +00:00
|
|
|
If you want to be able to prove that you're working with the same file
|
|
|
|
contents that were checked into a repository earlier, you should avoid
|
2020-07-29 19:23:18 +00:00
|
|
|
using non-cryptographically-secure backends, and will need to use
|
2017-02-25 00:03:36 +00:00
|
|
|
signed git commits. See [[tips/using_signed_git_commits]] for details.
|
|
|
|
|
2018-06-22 14:30:10 +00:00
|
|
|
Retrieval of WORM and URL from many [[special_remotes]] is prohibited
|
|
|
|
for [[security_reasons|security/CVE-2018-10857_and_CVE-2018-10859]].
|
|
|
|
|
2015-08-06 19:02:25 +00:00
|
|
|
Note that the various 512 and 384 length hashes result in long paths,
|
2015-01-07 02:33:57 +00:00
|
|
|
which are known to not work on Windows. If interoperability on Windows is a
|
2015-08-06 19:02:25 +00:00
|
|
|
concern, avoid those.
|
2015-01-07 02:33:57 +00:00
|
|
|
|
2018-10-12 20:28:25 +00:00
|
|
|
See also: [[git-annex-examinekey]]
|