Manifest format

Each collection record has a manifest_text field, which describes how to reassemble keep blocks into files. Each block identifier in the manifest has an added signature which is used to confirm permission to read the block. To read a block from a keepstore server, the client must provide the block identifier, the signature, and the same API token used to retrieve the collection record.

Manifest v1

A manifest is utf-8 encoded text, consisting of zero or more newline-terminated streams.

manifest       ::= stream*
stream         ::= stream-name (" " locator)+ (" " file-segment)+ "\n"
stream-name    ::= "." ("/" path-component)*
path-component ::= <printable ASCII - (whitespace, "/")>+
file-segment   ::= position ":" size ":" filename
position       ::= [0-9]+
size           ::= [0-9]+
filename       ::= path-component ("/" path-component)*

Notes:

  • The first token is the stream name, consisting of one or more path components, delimited by "/".
    • The first path component is always ".".
    • No path component is empty.
    • No path component following the first one can be “.” or “..”.
    • The stream name never begins or ends with "/".
  • The next N tokens are keep locators
    • These describe the “data stream”. By logically concatenating the blocks in the order that they appear, we can refer to “positions” in the data stream.
  • File tokens come after the sequence of keep locators.
    • A file token has three parts, delimited by ":": position, size, filename.
    • Position and size are given in decimal
    • The position is the position in the data stream
    • The size is the count of bytes following the position in the data stream. A file size may cross multiple blocks in the data stream.
    • Filename may contain "/" characters, but must not start or end with "/", and must not contain "//".
    • Filename components (delimited by "/") must not be "." or "..".
    • There may be multiple file tokens.

It is legal to have multiple file tokens in the manifest (possible across different streams) with the same combined path name stream name + "/" + filename. This must be interpreted as a concatenation of file content, in the order that the file tokens appear in the manifest.

Spaces are represented by the escape sequence \040. Spaces in stream names and filenames must be translated when reading and writing manifests. A manifest may not contain TAB characters, nor other ASCII whitespace characters or control codes other than the spaces or newlines used as delimiters specified above. A manifest always ends with a newline — except the empty (zero-length) string, which is a valid manifest.

Normalized manifest v1

A normalized manifest is a manifest that meets the following additional restrictions:

  • Streams are in alphanumeric order.
  • Each stream name is unique within the manifest.
  • Files within a stream are listed in alphanumeric order.
  • Blocks within a stream are ordered based on order of file tokens of the stream. A given block is listed at most once in a stream.
  • Filename must not contain "/" (the stream name represents the path prefix)

Estimating manifest size

Here’s a formula for estimating manifest size as stored in the database, assuming efficiently packed blocks.

manifest_size =
   + (total data size / 64 MB) * 40
   + sum(number of files * 20)
   + sum(size of all directory paths)
   + sum(size of all file names)

Here is the size when including block signatures. The block signatures authorize access to fetch each block from a Keep server, as described below. The signed manifest text is what is actually transferred to/from the API server and stored in RAM by arv-mount. The effective upper limit on how large a collection manifest can be is determined by API.MaxRequestSize in config.yml as well as the maximum request size configuration in your reverse proxy or load balancer (e.g. client_max_body_size in Nginx).

manifest_size =
   + (total data size / 64 MB) * 94
   + sum(number of files * 20)
   + sum(size of all directory paths)
   + sum(size of all file names)

Example manifests

A manifest with four files in two directories:

. 930625b054ce894ac40596c3f5a0d947+33 0:0:a 0:0:b 0:33:output.txt
./c d41d8cd98f00b204e9800998ecf8427e+0 0:0:d

The same manifest with permission signatures on each block:

. 930625b054ce894ac40596c3f5a0d947+33+A1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc 0:0:a 0:0:b 0:33:output.txt
./c d41d8cd98f00b204e9800998ecf8427e+0+A27117dcd30c013a6e85d6d74c9a50179a1446efa@5835c8bc 0:0:d

A manifest containing a file consisting of multiple blocks and a space in the file name:

. c449ed86671e4a34a8b8b9430850beba+67108864 09fcfea01c3a141b89dd0dcfa1b7768e+22534144 0:89643008:Docker\040image.tar

Keep locator format

BNF notation for a valid Keep locator string (with hints). For example: d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294

locator          ::= sized-digest hint*
sized-digest     ::= digest size-hint
digest           ::= <32 lowercase hexadecimal digits>
size-hint        ::= "+" [0-9]+
hint             ::= "+" hint-type hint-content
hint-type        ::= [A-Z]+
hint-content     ::= [A-Za-z0-9@_-]*
sign-hint        ::= "+A" <40 lowercase hexadecimal digits> "@" sign-timestamp
remote-sign-hint ::= "+R" [A-Za-z0-9]{5} "-" <40 lowercase hexadecimal digits> "@" sign-timestamp
sign-timestamp   ::= <8 lowercase hexadecimal digits>

Regular expression to validate locator

/^([0-9a-f]{32})\+([0-9]+)(\+[A-Z][-A-Za-z0-9@_]*)*$/

Valid locators

d41d8cd98f00b204e9800998ecf8427e+0
d41d8cd98f00b204e9800998ecf8427e+0+Z
d41d8cd98f00b204e9800998ecf8427e+0+Z+Ada39a3ee5e6b4b0d3255bfef95601890afd80709@53bed294
930625b054ce894ac40596c3f5a0d947+33+Rzzzzz-1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc

Invalid locators

Why
d41d8cd98f00b204e9800998ecf8427e No size hint
d41d8cd98f00b204e9800998ecf8427e+Z+0 Other hint before size hint
d41d8cd98f00b204e9800998ecf8427e+0+0 Multiple size hints
d41d8cd98f00b204e9800998ecf8427e+0+z Hint does not start with uppercase letter
d41d8cd98f00b204e9800998ecf8427e+0+Zfoo*bar Hint contains invalid character *

Token signatures

A token signature (sign-hint) provides proof-of-access for a data block. It is computed by taking a SHA1 HMAC of the blob signing token (a shared secret between the API server and keep servers), block digest, current API token, expiration timestamp, and blob signature TTL.

When communicating with the keepstore to fetch a block, or the API server to create or update a collection, the service computes the expected token signature for each block and compares it to the token signature that was presented by the client. Keep clients receive valid block signatures when uploading a block to a keep store (getting back a signed token as proof of knowledge) or, from the API server, getting the manifest text of a collection on which the user has read permission.

Security of a token signature is derived from the following characteristics:

  1. Valid signatures can only be generated by entities that know the shared secret (the “blob signing token”)
  2. A signature can only be used by an entity that also know the API token that was used to generate it.
  3. It expires after a set date (the expiration time, based on the “blob signature time-to-live (TTL)”)

Federation and signatures

When a collection record is returned through a federation request, the keep blocks listed in the manifest may not be available on the local cluster, and the keep block signatures returned by the remote cluster are not valid for the local cluster. To solve this, arvados-controller rewrites the signatures in the manifest to “remote cluster” signatures.

A local signature comes after the block identifier and block size, and starts with +A:

930625b054ce894ac40596c3f5a0d947+33+A1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc

A remote cluster signature starts with +R, then the cluster id of the cluster it originated from (zzzzz in this example), a dash, and then the original signature:

930625b054ce894ac40596c3f5a0d947+33+Rzzzzz-1f27a35dd9af37191d63ad8eb8985624451e7b79@5835c8bc

When the client provides a remote-signed block locator to keepstore, the keepstore proxies the request to the remote cluster.

  1. keepstore determines the cluster id to contact from the first part of the +R signature
  2. creates a salted token using the API token and cluster id
  3. contacts the “accessible” endpoint on the remote cluster to determine the remote cluster’s keepstore or keepproxy hosts
  4. converts the remote signature +R back to a local signature +A
  5. contacts the remote keepstore or keepproxy host and requests the block using the local signature
  6. returns the block contents back to the client

Example

This example uses c1bad4b39ca5a924e481008009d94e32+210, which is the content hash of a collection that was added to Keep in how to upload data. Get the collection manifest using arv-get:

~$ arv-get c1bad4b39ca5a924e481008009d94e32+210
. 204e43b8a1185621ca55a94839582e6f+67108864+Aasignatureforthisblockaaaaaaaaaaaaaaaaaa@5f612ee6 b9677abbac956bd3e86b1deb28dfac03+67108864+Aasignatureforthisblockbbbbbbbbbbbbbbbbbb@5f612ee6 fc15aff2a762b13f521baf042140acec+67108864+Aasignatureforthisblockcccccccccccccccccc@5f612ee6 323d2a3ce20370c4ca1d3462a344f8fd+25885655+Aasignatureforthisblockdddddddddddddddddd@5f612ee6 0:227212247:var-GS000016015-ASM.tsv.bz2

This collection includes a single file var-GS000016015-ASM.tsv.bz2 which is 227212247 bytes long. It is stored using four sequential data blocks with hashes 204e43b8a1185621ca55a94839582e6f+67108864, b9677abbac956bd3e86b1deb28dfac03+67108864, fc15aff2a762b13f521baf042140acec+67108864, and 323d2a3ce20370c4ca1d3462a344f8fd+25885655. Each of the block hashes is followed by the rest of their locator.

Use arv-get to download the first data block:

~$ arv-get 204e43b8a1185621ca55a94839582e6f+67108864+Aasignatureforthisblockaaaaaaaaaaaaaaaaaa@5f612ee6 > block1

Inspect the size and compute the MD5 hash of block1:

~$ ls -l block1
-rw-r--r-- 1 you group 67108864 Dec  9 20:14 block1
~$ md5sum block1
204e43b8a1185621ca55a94839582e6f  block1

As expected, the md5sum of the contents of the block matches the digest part of the locator, and the size of the contents matches the size-hint.


Previous: Data lifecycle Next: Computing with Crunch

The content of this documentation is licensed under the Creative Commons Attribution-Share Alike 3.0 United States licence.
Code samples in this documentation are licensed under the Apache License, Version 2.0.