Storage in Keep

Keep clients are applications such as arv-get, arv-put and arv-mount which store and retrieve data from Keep. In doing so, these programs interact with both the API server (which stores file metadata in form of Collection objects) and individual Keep servers (which store the actual data blocks).

Storing a file

  1. The client discovers keep servers (or proxies) using the accessible method on keep_services
  2. Data is split into 64 MiB blocks and the MD5 hash is computed for each block.
  3. The client uploads each block to one or more Keep servers, based on the number of desired replicas. The priority order is determined using rendezvous hashing, described below.
  4. The Keep server returns a block locator (the MD5 sum of the block) and a “signed token” which the client can use as proof of knowledge for the block.
  5. The client constructs a manifest which lists the blocks by MD5 hash and how to reassemble them into the original files.
  6. The client creates a collection and provides the manifest_text
  7. The API server accepts the collection after validating the signed tokens (proof of knowledge) for each block.

Fetching a file

  1. The client requests a collection object including manifest_text from the APIs server
  2. The server adds “token signatures” to the manifest_text and returns it to the client.
  3. The client discovers keep servers (or proxies) using the accessible method on keep_services
  4. For each data block, the client chooses the highest priority server using rendezvous hashing, described below.
  5. The client sends the data block request to the keep server, along with the token signature from the API which proves to Keep servers that the client is permitted to read a given block.
  6. The server provides the block data after validating the token signature for the block (if the server does not have the block, it returns a 404 and the client tries the next highest priority server)

Each keep_service resource has an assigned uuid. To determine priority assignments of blocks to servers, for each keep service compute the MD5 sum of the string concatenation of the block locator (hex-coded hash part only) and service uuid, then sort this list in descending order. Blocks are preferentially placed on servers with the highest weight.

Keep server API

The Keep server is accessed via a simple HTTP REST API.

GET /blocklocator+size+A@token

Fetch the data block. Response returns block contents. If permission checking is enabled, requires a valid token hint.

PUT /blocklocator

Body: the block contents. Responds the block locator consisting of MD5 sum of the data, block size, and signed token hint.

POST /

Body: the block contents. Responds the block locator consisting of MD5 sum of the data, block size, and signed token hint.

Keep locator format

BNF notation for a valid Keep locator string (with hints). For example @d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294@

locator        ::= sized-digest hint*
sized-digest   ::= digest size-hint
digest         ::= <32 lowercase hexadecimal digits>
size-hint      ::= "+" [0-9]+
hint           ::= "+" hint-type hint-content
hint-type      ::= [A-Z]+
hint-content   ::= [A-Za-z0-9@_-]*
sign-hint      ::= "+A" <40 lowercase hexadecimal digits> "@" sign-timestamp
sign-timestamp ::= <8 lowercase hexadecimal digits>

Token signatures

A token signature (sign-hint) provides proof-of-access for a data block. It is computed by taking a SHA1 HMAC of the blob signing token (a shared secret between the API server and keep servers), block digest, current API token, expiration timestamp, and blob signature TTL.

When communicating with the Keep store to fetch a block, or the API server to create or update a collection, the service computes the expected token signature for each block and compares it to the token signature that was presented by the client. Keep clients receive valid block signatures when uploading a block to a keep store (getting back a signed token as proof of knowledge) or, from the API server, getting the manifest text of a collection on which the user has read permission.

Security of a token signature is derived from the following characteristics:

  1. Valid signatures can only be generated by entities that know the shared secret (the “blob signing token”)
  2. A signature can only be used by an entity that also know the API token that was used to generate it.
  3. It expires after a set date (the expiration time, based on the “blob signature time-to-live (TTL)”)

Regular expression to validate locator

/^([0-9a-f]{32})\+([0-9]+)(\+[A-Z][-A-Za-z0-9@_]*)*$/

Valid locators

d41d8cd98f00b204e9800998ecf8427e+0
d41d8cd98f00b204e9800998ecf8427e+0+Z
d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294

Invalid locators

Why
d41d8cd98f00b204e9800998ecf8427e No size hint
d41d8cd98f00b204e9800998ecf8427e+Z+0 Other hint before size hint
d41d8cd98f00b204e9800998ecf8427e+0+0 Multiple size hints
d41d8cd98f00b204e9800998ecf8427e+0+z Hint does not start with uppercase letter
d41d8cd98f00b204e9800998ecf8427e+0+Zfoo*bar Hint contains invalid character *

Manifest v1

A manifest is utf-8 encoded text, consisting of zero or more newline-terminated streams.

manifest       ::= stream*
stream         ::= stream-name (" " locator)+ (" " file-segment)+ "\n"
stream-name    ::= "." ("/" path-component)*
path-component ::= <printable ASCII - (whitespace, "/")>+
file-segment   ::= position ":" size ":" filename
position       ::= [0-9]+
size           ::= [0-9]+
filename       ::= path-component ("/" path-component)*

Notes:

  • The first token is the stream name, consisting of one or more path components, delimited by "/".
    • The first path component is always ".".
    • No path component is empty.
    • No path component following the first one can be “.” or “..”.
    • The stream name never begins or ends with "/".
  • The next N tokens are keep locators
    • These describe the “data stream”. By logically concatenating the blocks in the order that they appear, we can refer to “positions” in the data stream.
  • File tokens come after the sequence of keep locators.
    • A file token has three parts, delimited by ":": position, size, filename.
    • Position and size are given in decimal
    • The position is the position in the data stream
    • The size is the count of bytes following the position in the data stream. A file size may cross multiple blocks in the data stream.
    • Filename may contain "/" characters, but must not start or end with "/", and must not contain "//".
    • Filename components (delimited by "/") must not be "." or "..".
    • There may be multiple file tokens.

It is legal to have multiple file tokens in the manifest (possible across different streams) with the same combined path name stream name + "/" + filename. This must be interpreted as a concatenation of file content, in the order that the file tokens appear in the manifest.

Spaces are represented by the escape sequence \040. Spaces in stream names and filenames must be translated when reading and writing manifests. A manifest may not contain TAB characters, nor other ASCII whitespace characters or control codes other than the spaces or newlines used as delimiters specified above. A manifest always ends with a newline — except the empty (zero-length) string, which is a valid manifest.

Normalized manifest v1

A normalized manifest is a manifest that meets the following additional restrictions:

  • Streams are in alphanumeric order.
  • Each stream name is unique within the manifest.
  • Files within a stream are listed in alphanumeric order.
  • Blocks within a stream are ordered based on order of file tokens of the stream. A given block is listed at most once in a stream.
  • Filename must not contain "/" (the stream name represents the path prefix)

Example manifests

A manifest with four files in two directories:

. 930625b054ce894ac40596c3f5a0d947+33 0:0:a 0:0:b 0:33:output.txt
./c d41d8cd98f00b204e9800998ecf8427e+0 0:0:d

The same manifest with permission signatures on each block:

. 930625b054ce894ac40596c3f5a0d947+33+A1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc 0:0:a 0:0:b 0:33:output.txt
./c d41d8cd98f00b204e9800998ecf8427e+0+A27117dcd30c013a6e85d6d74c9a50179a1446efa@5835c8bc 0:0:d

A manifest containing a file consisting of multiple blocks and a space in the file name:

. c449ed86671e4a34a8b8b9430850beba+67108864 09fcfea01c3a141b89dd0dcfa1b7768e+22534144 0:89643008:Docker\040image.tar

Previous: Permission model Next: Computing with Crunch

The content of this documentation is licensed under the Creative Commons Attribution-Share Alike 3.0 United States licence.
Code samples in this documentation are licensed under the Apache License, Version 2.0.