X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/267d3c40bf1c5503e6487db2ab1f6a4339ac5f83..9acc8cb9cd9ca4429712b0d31b647e9a6ecf2d96:/sdk/go/arvados/collection.go diff --git a/sdk/go/arvados/collection.go b/sdk/go/arvados/collection.go index cec20279d1..389fe4e484 100644 --- a/sdk/go/arvados/collection.go +++ b/sdk/go/arvados/collection.go @@ -5,7 +5,7 @@ package arvados import ( - "bufio" + "bytes" "crypto/md5" "fmt" "regexp" @@ -15,6 +15,11 @@ import ( "git.arvados.org/arvados.git/sdk/go/blockdigest" ) +var ( + UUIDMatch = regexp.MustCompile(`^[a-z0-9]{5}-[a-z0-9]{5}-[a-z0-9]{15}$`).MatchString + PDHMatch = regexp.MustCompile(`^[0-9a-f]{32}\+\d+$`).MatchString +) + // Collection is an arvados#collection resource. type Collection struct { UUID string `json:"uuid"` @@ -56,40 +61,40 @@ func (c Collection) resourceName() string { // // Zero-length blocks are not included. func (c *Collection) SizedDigests() ([]SizedDigest, error) { - manifestText := c.ManifestText - if manifestText == "" { - manifestText = c.UnsignedManifestText + manifestText := []byte(c.ManifestText) + if len(manifestText) == 0 { + manifestText = []byte(c.UnsignedManifestText) } - if manifestText == "" && c.PortableDataHash != "d41d8cd98f00b204e9800998ecf8427e+0" { + if len(manifestText) == 0 && c.PortableDataHash != "d41d8cd98f00b204e9800998ecf8427e+0" { // TODO: Check more subtle forms of corruption, too return nil, fmt.Errorf("manifest is missing") } - var sds []SizedDigest - scanner := bufio.NewScanner(strings.NewReader(manifestText)) - scanner.Buffer(make([]byte, 1048576), len(manifestText)) - for scanner.Scan() { - line := scanner.Text() - tokens := strings.Split(line, " ") + sds := make([]SizedDigest, 0, len(manifestText)/40) + for _, line := range bytes.Split(manifestText, []byte{'\n'}) { + if len(line) == 0 { + continue + } + tokens := bytes.Split(line, []byte{' '}) if len(tokens) < 3 { return nil, fmt.Errorf("Invalid stream (<3 tokens): %q", line) } for _, token := range tokens[1:] { - if !blockdigest.LocatorPattern.MatchString(token) { + if !blockdigest.LocatorPattern.Match(token) { // FIXME: ensure it's a file token break } - if strings.HasPrefix(token, "d41d8cd98f00b204e9800998ecf8427e+0") { + if bytes.HasPrefix(token, []byte("d41d8cd98f00b204e9800998ecf8427e+0")) { // Exclude "empty block" placeholder continue } // FIXME: shouldn't assume 32 char hash - if i := strings.IndexRune(token[33:], '+'); i >= 0 { + if i := bytes.IndexRune(token[33:], '+'); i >= 0 { token = token[:33+i] } - sds = append(sds, SizedDigest(token)) + sds = append(sds, SizedDigest(string(token))) } } - return sds, scanner.Err() + return sds, nil } type CollectionList struct { @@ -123,3 +128,25 @@ func PortableDataHash(mt string) string { }) return fmt.Sprintf("%x+%d", h.Sum(nil), size) } + +// CollectionIDFromDNSName returns a UUID or PDH if s begins with a +// UUID or URL-encoded PDH; otherwise "". +func CollectionIDFromDNSName(s string) string { + // Strip domain. + if i := strings.IndexRune(s, '.'); i >= 0 { + s = s[:i] + } + // Names like {uuid}--collections.example.com serve the same + // purpose as {uuid}.collections.example.com but can reduce + // cost/effort of using [additional] wildcard certificates. + if i := strings.Index(s, "--"); i >= 0 { + s = s[:i] + } + if UUIDMatch(s) { + return s + } + if pdh := strings.Replace(s, "-", "+", 1); PDHMatch(pdh) { + return pdh + } + return "" +}