-
Notifications
You must be signed in to change notification settings - Fork 29.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: Canonical URI identity provider #180582
Labels
api
api-proposal
continue-working-on
feature-request
Request for new features or functionality
on-testplan
workspace-trust
Trusted workspaces
Milestone
Comments
Feedback from API sync
Additional feedback from @sbatten
Updated proposal shape: declare module 'vscode' {
export namespace workspace {
/**
*
* @param scheme The URI scheme that this provider can provide canonical URI identities for.
* A canonical URI represents the conversion of a resource's alias into a source of truth URI.
* Multiple aliases may convert to the same source of truth URI.
* @param provider A provider which can convert URIs for workspace folders of scheme @param scheme to
* a canonical URI identifier which is stable across machines.
*/
export function registerCanonicalUriIdentityProvider(scheme: string, provider: CanonicalUriIdentityProvider): Disposable;
/**
*
* @param uri The URI to provide a canonical URI identity for.
* @param token A cancellation token for the request.
*/
export function getCanonicalUri(uri: Uri, options: CanonicalUriRequestOptions, token: CancellationToken): ProviderResult<Uri>;
}
export interface CanonicalUriIdentityProvider {
/**
*
* @param uri The URI to provide a canonical URI identity for.
* @param token A cancellation token for the request.
* @returns The canonical URI identity for the requested URI.
*/
provideCanonicalUriIdentity(uri: Uri, options: CanonicalUriRequestOptions, token: CancellationToken): ProviderResult<Uri>;
}
export interface CanonicalUriRequestOptions {
targetScheme: string;
}
} |
This was referenced May 25, 2023
2 tasks
62 tasks
joyceerhl
added
continue-working-on
workspace-trust
Trusted workspaces
feature-request
Request for new features or functionality
labels
Dec 4, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
api
api-proposal
continue-working-on
feature-request
Request for new features or functionality
on-testplan
workspace-trust
Trusted workspaces
In both edit sessions and workspace trust, we need to solve the problem of disambiguating URIs across filesystems. The approaches currently taken are:
getCanonicalUri
APi from the remote proposal to determine that a folder from the local filesystem which is mounted into a remote has already been trusted in the local filesystemThis results in friction for users, who must repeatedly trust the same repository across different filesystems, and who are unable to roam workspace state for the same repository across two different filesystems if they have been cloned with different remotes.
To address both these scenarios, we would like to introduce an API proposal for transforming URIs if a URI has one or more alternate identities. This is not an inherently source control-specific concept, since you could have a folder on a local filesystem which is mounted into a container and not backed by source control, and in that scenario it should be possible to say that the local file:// URI is equivalent to the vscode-remote:// URI. It is also not an inherently remote-specific concept, since two file:// URIs for the same repository on two different filesystems should be resolvable to the same identity.
Prior art:
vscode/src/vscode-dts/vscode.proposed.resolvers.d.ts
Lines 133 to 138 in 5df31a1
vscode/src/vscode-dts/vscode.proposed.editSessionIdentityProvider.d.ts
Lines 25 to 32 in 5df31a1
Initial proposal:
Example usage:
vscode-remote
containers
{ host: 'file', metadata: 'filepath' }
file
{ host: 'github', metadata: 'microsoft/vscode' }
vscode-vfs
github
{ host: 'github', metadata: 'owner/repo' }
vscode-vfs
azurerepos
{ host: 'azurerepos', metadata: 'org/project/repo' }
An alternative solution for workspace trust is to instead leverage #179898 and declare that a workspace has been trusted before by storing this information for
StorageScope.Workspace
andStorageTarget.User
, which will lead to that information roamed via edit sessions. However that won't allow workspace trust to move away from the hack it does forvscode-vfs
URIs, since edit sessions takes the branch and SHA into account, andvscode-vfs
URIs bake that information in as well.The text was updated successfully, but these errors were encountered: