Skip to content

Commit bda9a17

Browse files
committed
feat: add protobuf size
1 parent 29f81e0 commit bda9a17

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

core/commands/name/name.go

+6-5
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,7 @@ type IpnsInspectEntry struct {
9696

9797
type IpnsInspectResult struct {
9898
Entry IpnsInspectEntry
99+
PbSize int
99100
SignatureType string
100101
HexDump string
101102
Validation *IpnsInspectValidation
@@ -129,7 +130,7 @@ Passing --verify will verify signature against provided public key.
129130
},
130131
Options: []cmds.Option{
131132
cmds.StringOption("verify", "CID of the public IPNS key to validate against."),
132-
cmds.BoolOption("verbose", "Show a full hex dump of the raw Protobuf record."),
133+
cmds.BoolOption("dump", "Include a full hex dump of the raw Protobuf record.").WithDefault(true),
133134
},
134135
Run: func(req *cmds.Request, res cmds.ResponseEmitter, env cmds.Environment) error {
135136
file, err := cmdenv.GetFileArg(req.Files.Entries())
@@ -188,6 +189,7 @@ Passing --verify will verify signature against provided public key.
188189
} else {
189190
result.SignatureType = "Unknown"
190191
}
192+
result.PbSize = proto.Size(&pbRecord)
191193

192194
if verify, ok := req.Options["verify"].(string); ok {
193195
name, err := ipns.NameFromString(verify)
@@ -207,7 +209,7 @@ Passing --verify will verify signature against provided public key.
207209
}
208210
}
209211

210-
if verbose, ok := req.Options["verbose"].(bool); ok && verbose {
212+
if dump, ok := req.Options["dump"].(bool); ok && dump {
211213
result.HexDump = hex.Dump(b.Bytes())
212214
}
213215

@@ -239,9 +241,8 @@ Passing --verify will verify signature against provided public key.
239241
fmt.Fprintf(tw, "TTL:\t%s\n", out.Entry.TTL.String())
240242
}
241243

242-
if out.SignatureType != "" {
243-
fmt.Fprintf(tw, "Signature Type:\t%s\n", out.SignatureType)
244-
}
244+
fmt.Fprintf(tw, "Protobuf Size:\t%d\n", out.PbSize)
245+
fmt.Fprintf(tw, "Signature Type:\t%s\n", out.SignatureType)
245246

246247
if out.Validation == nil {
247248
tw.Flush()

test/cli/name_test.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,6 @@ func TestName(t *testing.T) {
169169

170170
res = node.IPFS("routing", "get", ipnsPath)
171171
record := res.Stdout.Bytes()
172-
t.Log(record)
173172

174173
res = node.PipeToIPFS(bytes.NewReader(record), "name", "inspect")
175174
out := res.Stdout.String()
@@ -181,6 +180,7 @@ func TestName(t *testing.T) {
181180
out = res.Stdout.String()
182181
require.Contains(t, out, "Valid: true")
183182
require.Contains(t, out, "Signature Type: V2")
183+
require.Contains(t, out, fmt.Sprintf("Protobuf Size: %d", len(record)))
184184
})
185185

186186
t.Run("Publish with TTL and inspect record", func(t *testing.T) {
@@ -202,6 +202,7 @@ func TestName(t *testing.T) {
202202
require.Contains(t, out, publishPath)
203203
require.Contains(t, out, "30m")
204204
require.Contains(t, out, "Signature Type: V1+V2")
205+
require.Contains(t, out, fmt.Sprintf("Protobuf Size: %d", len(record)))
205206
})
206207

207208
t.Run("Inspect record shows valid with correct name", func(t *testing.T) {

0 commit comments

Comments
 (0)