tar archive assembly/disassembly
Go to file
Vincent Batts 779e824d76 README: formatting and cleanup 2015-08-10 15:36:30 -04:00
archive/tar archive/tar: cleaner reset 2015-02-20 14:49:23 -05:00
cmd/tar-split cmd/tar-split: adding to the README 2015-07-28 17:16:04 -04:00
concept README: formatting and cleanup 2015-08-10 15:36:30 -04:00
tar tar/storage: switch to map[string]struct{} for set 2015-07-22 15:32:49 -04:00
.travis.yml travis: incorrect comment 2015-07-28 15:45:24 -04:00
LICENSE .: add README and LICENSE 2015-02-20 10:29:48 -05:00
README.md README: formatting and cleanup 2015-08-10 15:36:30 -04:00
checksize.go *: golint and docs 2015-03-09 14:11:11 -04:00

README.md

tar-split

Build Status

Extend the upstream golang stdlib archive/tar library, to expose the raw bytes of the TAR, rather than just the marshalled headers and file stream.

The goal being that by preserving the raw bytes of each header, padding bytes, and the raw file payload, one could reassemble the original archive.

Docs

Caveat

Eventually this should detect TARs that this is not possible with.

For example stored sparse files that have "holes" in them, will be read as a contiguous file, though the archive contents may be recorded in sparse format. Therefore when adding the file payload to a reassembled tar, to achieve identical output, the file payload would need be precisely re-sparsified. This is not something I seek to fix imediately, but would rather have an alert that precise reassembly is not possible. (see more http://www.gnu.org/software/tar/manual/html_node/Sparse-Formats.html)

Other caveat, while tar archives support having multiple file entries for the same path, we will not support this feature. If there are more than one entries with the same path, expect an err (like ErrDuplicatePath) or a resulting tar stream that does not validate your original checksum/signature.

Contract

Do not break the API of stdlib archive/tar in our fork (ideally find an upstream mergeable solution).

Std Version

The version of golang stdlib archive/tar is from go1.4.1, and their master branch around a9dddb53f

Concept

See the design.

Stored Metadata

Since the raw bytes of the headers and padding are stored, you may be wondering what the size implications are. The headers are at least 512 bytes per file (sometimes more), at least 1024 null bytes on the end, and then various padding. This makes for a constant linear growth in the stored metadata, with a naive storage implementation.

Reusing our prior example's tar-split.tar, let's build the checksize.go example:

go build ./checksize.go
$ ./checksize ./tar-split.tar
inspecting "tar-split.tar" (size 210k)
 -- number of files: 50
 -- size of metadata uncompressed: 53k
 -- size of gzip compressed metadata: 3k

So assuming you've managed the extraction of the archive yourself, for reuse of the file payloads from a relative path, then the only additional storage implications are as little as 3kb.

But let's look at a larger archive, with many files.

$ ls -sh ./d.tar
1.4G ./d.tar
$ ./checksize ~/d.tar 
inspecting "/home/vbatts/d.tar" (size 1420749k)
 -- number of files: 38718
 -- size of metadata uncompressed: 43261k
 -- size of gzip compressed metadata: 2251k

Here, an archive with 38,718 files has a compressed footprint of about 2mb.

Rolling the null bytes on the end of the archive, we will assume a bytes-per-file rate for the storage implications.

uncompressed compressed
~ 1kb per/file 0.06kb per/file

What's Next?

  • More implementations of storage Packer and Unpacker
  • could be a redis or mongo backend
  • More implementations of FileGetter and FilePutter
  • could be a redis or mongo backend
  • cli tooling to assemble/disassemble a provided tar archive
  • would be interesting to have an assembler stream that implements io.Seeker

License

See LICENSE