Each collection record has a manifest_text
field, which describes how to reassemble keep blocks into files. Each block identifier in the manifest has an added signature which is used to confirm permission to read the block. To read a block from a keepstore server, the client must provide the block identifier, the signature, and the same API token used to retrieve the collection record.
A manifest is utf-8 encoded text, consisting of zero or more newline-terminated streams.
manifest ::= stream* stream ::= stream-name (" " locator)+ (" " file-segment)+ "\n" stream-name ::= "." ("/" path-component)* path-component ::= <printable ASCII - (whitespace, "/")>+ file-segment ::= position ":" size ":" filename position ::= [0-9]+ size ::= [0-9]+ filename ::= path-component ("/" path-component)*
Notes:
"/"
.
"."
."/"
.":"
: position, size, filename."/"
characters, but must not start or end with "/"
, and must not contain "//"
."/"
) must not be "."
or ".."
.It is legal to have multiple file tokens in the manifest (possible across different streams) with the same combined path name stream name + "/" + filename
. This must be interpreted as a concatenation of file content, in the order that the file tokens appear in the manifest.
Spaces are represented by the escape sequence \040
. Spaces in stream names and filenames must be translated when reading and writing manifests. A manifest may not contain TAB characters, nor other ASCII whitespace characters or control codes other than the spaces or newlines used as delimiters specified above. A manifest always ends with a newline — except the empty (zero-length) string, which is a valid manifest.
A normalized manifest is a manifest that meets the following additional restrictions:
"/"
(the stream name represents the path prefix)Here’s a formula for estimating manifest size as stored in the database, assuming efficiently packed blocks.
manifest_size = + (total data size / 64 MB) * 40 + sum(number of files * 20) + sum(size of all directory paths) + sum(size of all file names)
Here is the size when including block signatures. The block signatures authorize access to fetch each block from a Keep server, as described below. The signed manifest text is what is actually transferred to/from the API server and stored in RAM by arv-mount
. The effective upper limit on how large a collection manifest can be is determined by API.MaxRequestSize
in config.yml
as well as the maximum request size configuration in your reverse proxy or load balancer (e.g. client_max_body_size
in Nginx).
manifest_size = + (total data size / 64 MB) * 94 + sum(number of files * 20) + sum(size of all directory paths) + sum(size of all file names)
A manifest with four files in two directories:
. 930625b054ce894ac40596c3f5a0d947+33 0:0:a 0:0:b 0:33:output.txt ./c d41d8cd98f00b204e9800998ecf8427e+0 0:0:d
The same manifest with permission signatures on each block:
. 930625b054ce894ac40596c3f5a0d947+33+A1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc 0:0:a 0:0:b 0:33:output.txt ./c d41d8cd98f00b204e9800998ecf8427e+0+A27117dcd30c013a6e85d6d74c9a50179a1446efa@5835c8bc 0:0:d
A manifest containing a file consisting of multiple blocks and a space in the file name:
. c449ed86671e4a34a8b8b9430850beba+67108864 09fcfea01c3a141b89dd0dcfa1b7768e+22534144 0:89643008:Docker\040image.tar
BNF notation for a valid Keep locator string (with hints). For example: d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294
locator ::= sized-digest hint* sized-digest ::= digest size-hint digest ::= <32 lowercase hexadecimal digits> size-hint ::= "+" [0-9]+ hint ::= "+" hint-type hint-content hint-type ::= [A-Z]+ hint-content ::= [A-Za-z0-9@_-]* sign-hint ::= "+A" <40 lowercase hexadecimal digits> "@" sign-timestamp remote-sign-hint ::= "+R" [A-Za-z0-9]{5} "-" <40 lowercase hexadecimal digits> "@" sign-timestamp sign-timestamp ::= <8 lowercase hexadecimal digits>
/^([0-9a-f]{32})\+([0-9]+)(\+[A-Z][-A-Za-z0-9@_]*)*$/
d41d8cd98f00b204e9800998ecf8427e+0 |
d41d8cd98f00b204e9800998ecf8427e+0+Z |
d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294 |
930625b054ce894ac40596c3f5a0d947+33+Rzzzzz-1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc |
Why | |
d41d8cd98f00b204e9800998ecf8427e |
No size hint |
d41d8cd98f00b204e9800998ecf8427e+Z+0 |
Other hint before size hint |
d41d8cd98f00b204e9800998ecf8427e+0+0 |
Multiple size hints |
d41d8cd98f00b204e9800998ecf8427e+0+z |
Hint does not start with uppercase letter |
d41d8cd98f00b204e9800998ecf8427e+0+Zfoo*bar |
Hint contains invalid character * |
A token signature (sign-hint) provides proof-of-access for a data block. It is computed by taking a SHA1 HMAC of the blob signing token (a shared secret between the API server and keep servers), block digest, current API token, expiration timestamp, and blob signature TTL.
When communicating with the keepstore
to fetch a block, or the API server to create or update a collection, the service computes the expected token signature for each block and compares it to the token signature that was presented by the client. Keep clients receive valid block signatures when uploading a block to a keep store (getting back a signed token as proof of knowledge) or, from the API server, getting the manifest text of a collection on which the user has read permission.
Security of a token signature is derived from the following characteristics:
When a collection record is returned through a federation request, the keep blocks listed in the manifest may not be available on the local cluster, and the keep block signatures returned by the remote cluster are not valid for the local cluster. To solve this, arvados-controller
rewrites the signatures in the manifest to “remote cluster” signatures.
A local signature comes after the block identifier and block size, and starts with +A
:
930625b054ce894ac40596c3f5a0d947+33+A1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc
A remote cluster signature starts with +R
, then the cluster id of the cluster it originated from (zzzzz
in this example), a dash, and then the original signature:
930625b054ce894ac40596c3f5a0d947+33+Rzzzzz-1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc
When the client provides a remote-signed block locator to keepstore, the keepstore proxies the request to the remote cluster.
+R
signature+R
back to a local signature +A
This example uses c1bad4b39ca5a924e481008009d94e32+210
, which is the content hash of a collection
that was added to Keep in how to upload data. Get the collection manifest using arv-get
:
~$ arv-get c1bad4b39ca5a924e481008009d94e32+210
. 204e43b8a1185621ca55a94839582e6f+67108864+Aasignatureforthisblockaaaaaaaaaaaaaaaaaa@5f612ee6 b9677abbac956bd3e86b1deb28dfac03+67108864+Aasignatureforthisblockbbbbbbbbbbbbbbbbbb@5f612ee6 fc15aff2a762b13f521baf042140acec+67108864+Aasignatureforthisblockcccccccccccccccccc@5f612ee6 323d2a3ce20370c4ca1d3462a344f8fd+25885655+Aasignatureforthisblockdddddddddddddddddd@5f612ee6 0:227212247:var-GS000016015-ASM.tsv.bz2
This collection includes a single file var-GS000016015-ASM.tsv.bz2
which is 227212247 bytes long. It is stored using four sequential data blocks with hashes 204e43b8a1185621ca55a94839582e6f+67108864
, b9677abbac956bd3e86b1deb28dfac03+67108864
, fc15aff2a762b13f521baf042140acec+67108864
, and 323d2a3ce20370c4ca1d3462a344f8fd+25885655
. Each of the block hashes is followed by the rest of their locator.
Use arv-get
to download the first data block:
~$ arv-get 204e43b8a1185621ca55a94839582e6f+67108864+Aasignatureforthisblockaaaaaaaaaaaaaaaaaa@5f612ee6 > block1
Inspect the size and compute the MD5 hash of block1
:
~$ ls -l block1
-rw-r--r-- 1 you group 67108864 Dec 9 20:14 block1
~$ md5sum block1
204e43b8a1185621ca55a94839582e6f block1
As expected, the md5sum of the contents of the block matches the digest
part of the locator, and the size of the contents matches the size-hint
.
The content of this documentation is licensed under the
Creative
Commons Attribution-Share Alike 3.0 United States licence.
Code samples in this documentation are licensed under the
Apache License, Version 2.0.