Table of Contents↗️

filepack

crates.io version build status downloads

`filepack` is a command-line file hashing and verification utility written in Rust. It is an alternative to `.sfv` files and tools like `shasum`. Files are hashed using [BLAKE3](https://github.com/BLAKE3-team/BLAKE3/), a fast, cryptographic hash function. A manifest named `filepack.json` containing the hashes of files in a directory can be created with: ```sh filepack create path/to/directory ``` Which will write the manifest to `path/to/directory/filepack.json`. Files can later be verified with: ``` filepack verify path/to/directory ``` To protect against accidental or malicious corruption, as long as the manifest has not been tampered with. If you run `filepack` a lot, you might want to `alias fp=filepack`. `filepack` is currently unstable: the interface and file format may change at any time. Additionally, the code has not been extensively reviewed and should be considered experimental. Installation ------------ `filepack` is written in [Rust](https://www.rust-lang.org/) and can be built from source and installed from a checked-out copy of this repo with: ```sh cargo install --path . ``` Or from [crates.io](https://crates.io/crates/filepack) with: ```sh cargo install filepack ``` See [rustup.rs](https://rustup.rs/) for installation instructions for Rust. ### Pre-Built Binaries Pre-built binaries for Linux, MacOS, and Windows can be found on [the releases page](https://github.com/casey/filepack/releases). You can use the following command on Linux, MacOS, or Windows to download the latest release, just replace `DEST` with the directory where you'd like to put `filepack`: ```sh curl --proto '=https' --tlsv1.2 -sSf https://filepack.com/install.sh | bash -s -- --to DEST ``` For example, to install `filepack` to `~/bin`: ```sh # create ~/bin mkdir -p ~/bin # download and extract filepack to ~/bin/filepack curl --proto '=https' --tlsv1.2 -sSf https://filepack.com/install.sh | bash -s -- --to ~/bin # add `~/bin` to the paths that your shell searches for executables # this line should be added to your shell's initialization file, # e.g. `~/.bashrc` or `~/.zshrc` export PATH="$PATH:$HOME/bin" # filepack should now be executable filepack --help ``` Note that `install.sh` may fail on GitHub Actions or in other environments where many machines share IP addresses. `install.sh` calls GitHub APIs in order to determine the latest version of `filepack` to install, and those API calls are rate-limited on a per-IP basis. To make `install.sh` more reliable in such circumstances, pass a specific tag to install with `--tag`. Usage ----- Filepack supports a number of subcommands, including `filepack create` to create a manifest, and `filepack verify` to verify a manifest. See `filepack help` for supported subcommands and `filepack help SUBCOMMAND` for information about a particular subcommand. ### `filepack create` Create a manifest. Optional path portability lints can be enabled with: ``` filepack create --deny all ``` Metadata can optionally be included in the manifest with: ``` filepack create --metadata ``` Where `` is a [YAML](https://en.wikipedia.org/wiki/YAML) document containing metadata with the same schema as that of the manifest. Manifest -------- `filepack` manifests are conventionally named `filepack.json` and are placed alongside the files they reference. Manifests are [UTF-8](https://en.wikipedia.org/wiki/UTF-8)-encoded [JSON](https://www.json.org/json-en.html). As a consequence of the manifest being UTF-8 , all file paths must be valid Unicode. For cross-platform compatibility, paths are `/`-separated and may not contain backslashes. Paths are relative, meaning that they cannot begin with a `/` or a Windows drive prefix, such as `C:`. Paths may not contain the path components `.` or `..` and may not end with a slash. Filepack has no way of tracking empty directories, the presence of which are an error when creating or verifying a manifest. Manifests contain an object with one mandatory key, `files`. ### `files` The value of the mandatory `files` key is an object mapping string paths to manifest entries. Manifest entries are objects with the key `hash`, whose value is a hex-encoded BLAKE3 hash of the file, and `size`, whose value is the length of the file in bytes. An example manifest for a directory containing the files `README.md` and `src/main.c`: ```json { "files": { "README.md": { "hash": "5a9a6d96244ec398545fc0c98c2cb7ed52511b025c19e9ad1e3c1ef4ac8575ad", "size": 1573 }, "src/main.c": { "hash": "38abf296dc2a90f66f7870fe0ce584af3859668cf5140c7557a76786189dcf0f", "size": 4491 } } } ``` Metadata -------- `filepack create` can optionally write metadata describing the contents of the package to a file named `metadata.json`, containing a JSON object with the following keys: - `title`: A string containing the package's human-readable title. An example `metadata.json`: ```js { "title": "Tobin's Spirit Guide" } ``` Lints ----- `filepack create` supports optional lints that can be enabled with: ``` filepack create --deny all ``` These lints cover issues such as non-portable paths which are illegal on Windows file systems, paths which would conflict on case-insensitive file systems, and inclusion of junk files such as `.DS_Store`. Lofty Ambitions --------------- `filepack` has lofty ambitions! - Definition of a "root" hash, likely just the hash of the manifest itself, so that as long as the root hash is received from a trusted source the manifest itself does not need to be trusted. - Creation and verification of signatures over the root hash, so that developers and packagers can vouch for the correctness of the contents of a manifest, and users can verify that a manifest was signed by a trusted public key. - Portability lints, so packagers can ensure that the files in a manifest can be used in other environments, for example case-insensitive and Windows file systems. - Semantic, machine-readable metadata about *what* a package is. For example, human-readable title, suggested filename-safe slug, description, or year of publication, to aid package indexing and search. Suggestions for new features are most welcome! Alternatives and Prior Art -------------------------- `filepack` serves the same purpose as programs like `shasum`, which hash files and output a text file containing file hashes and paths, which can later be used with the same program to verify that the files have not changed. They output hashes and paths one per line, separated by whitespace, and mainly differ in which hash function they use. Some examples, with links to implementations and the hash functions they use: | binary | hash function | |---|---| | [`b2sum`](https://github.com/BLAKE2/BLAKE2) | [BLAKE2](https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE2) | | [`b3sum`](https://github.com/BLAKE3-team/BLAKE3) | [BLAKE3](https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE3) | | [`cksfv`](https://zakalwe.fi/~shd/foss/cksfv/) | [CRC-32](https://en.wikipedia.org/wiki/Cyclic_redundancy_check) | | [`hashdeep`](https://github.com/jessek/hashdeep) | various | | [`hashdir`](https://github.com/ultimateanu/hashdir/) | various | | [`sha3sum`](https://codeberg.org/maandree/sha3sum) | [SHA-3](https://en.wikipedia.org/wiki/SHA-3) | | [`shasum`](https://metacpan.org/pod/Digest::SHA) | [SHA-1](https://en.wikipedia.org/wiki/SHA-1) and [SHA-2](https://en.wikipedia.org/wiki/SHA-2) | CRC-32 is not a cryptographic hash function and cannot be used to detect intentional modifications. Similarly, SHA-1 was thought to be a cryptographic hash function, but is now known to be insecure. `filepack` and `b3sum` both use BLAKE3, a fast, general-purpose cryptographic hash function. `filepack` can also create and verify signatures. Other signing and verification utilities incude: | binary | about | |---|---| | [`gpg`](https://gnupg.org/) | general-purpose, [OpenPGP](https://www.openpgp.org/) implementation | | [`ssh-keygen`](https://man.openbsd.org/ssh-keygen.1) | general-purpose, shipped with [OpenSSH](https://www.openssh.com/) | | [`minisign`](https://github.com/jedisct1/minisign) | general-purpose | | [`signifiy`]( https://github.com/aperezdc/signify) | general-purpose | | [`SignTool`](https://learn.microsoft.com/en-us/windows/win32/seccrypto/signtool) | Windows code signing | | [`codesign`](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Procedures/Procedures.html) | macOS code signing | | [`jarsigner`](https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html) | JDK code signing |