@@ -96,6 +96,7 @@ type IpnsInspectEntry struct {
96
96
97
97
type IpnsInspectResult struct {
98
98
Entry IpnsInspectEntry
99
+ PbSize int
99
100
SignatureType string
100
101
HexDump string
101
102
Validation * IpnsInspectValidation
@@ -129,7 +130,7 @@ Passing --verify will verify signature against provided public key.
129
130
},
130
131
Options : []cmds.Option {
131
132
cmds .StringOption ("verify" , "CID of the public IPNS key to validate against." ),
132
- cmds .BoolOption ("verbose " , "Show a full hex dump of the raw Protobuf record." ),
133
+ cmds .BoolOption ("dump " , "Include a full hex dump of the raw Protobuf record." ). WithDefault ( true ),
133
134
},
134
135
Run : func (req * cmds.Request , res cmds.ResponseEmitter , env cmds.Environment ) error {
135
136
file , err := cmdenv .GetFileArg (req .Files .Entries ())
@@ -188,6 +189,7 @@ Passing --verify will verify signature against provided public key.
188
189
} else {
189
190
result .SignatureType = "Unknown"
190
191
}
192
+ result .PbSize = proto .Size (& pbRecord )
191
193
192
194
if verify , ok := req .Options ["verify" ].(string ); ok {
193
195
name , err := ipns .NameFromString (verify )
@@ -207,7 +209,7 @@ Passing --verify will verify signature against provided public key.
207
209
}
208
210
}
209
211
210
- if verbose , ok := req .Options ["verbose " ].(bool ); ok && verbose {
212
+ if dump , ok := req .Options ["dump " ].(bool ); ok && dump {
211
213
result .HexDump = hex .Dump (b .Bytes ())
212
214
}
213
215
@@ -239,9 +241,8 @@ Passing --verify will verify signature against provided public key.
239
241
fmt .Fprintf (tw , "TTL:\t %s\n " , out .Entry .TTL .String ())
240
242
}
241
243
242
- if out .SignatureType != "" {
243
- fmt .Fprintf (tw , "Signature Type:\t %s\n " , out .SignatureType )
244
- }
244
+ fmt .Fprintf (tw , "Protobuf Size:\t %d\n " , out .PbSize )
245
+ fmt .Fprintf (tw , "Signature Type:\t %s\n " , out .SignatureType )
245
246
246
247
if out .Validation == nil {
247
248
tw .Flush ()
0 commit comments