Commit graph

33532 commits

Author SHA1 Message Date
Joey Hess
61b1f9deaf
close 2018-12-09 11:44:53 -04:00
Joey Hess
c34474830b
close 2018-12-09 11:41:34 -04:00
Joey Hess
2681aac1a0
comment 2018-12-09 11:39:55 -04:00
Joey Hess
7d5b56d99c
responses 2018-12-09 11:31:43 -04:00
Joey Hess
41b9d77201
comment 2018-12-09 11:14:09 -04:00
Joey Hess
2d9b3e4510
comment 2018-12-09 11:11:53 -04:00
andrew
666db40a32 Added a comment 2018-12-08 16:46:35 +00:00
andrew
c1fc4574c8 Added a comment 2018-12-08 16:43:07 +00:00
Ilya_Shlyakhter
22b487e738 asked about adding tests under concurrency 2018-12-07 17:16:56 +00:00
Ilya_Shlyakhter
85651be9c4 added bug report about git index lock being held during concurrent operations 2018-12-07 17:08:25 +00:00
yarikoptic
f59d8c1e85 a few words about myself - shouldn't hurt 2018-12-06 23:10:46 +00:00
Ilya_Shlyakhter
a5e7aad011 added question about conda-forge build 2018-12-06 21:11:31 +00:00
Joey Hess
9d93c78f15
Merge branch 'master' of ssh://git-annex.branchable.com 2018-12-06 13:48:19 -04:00
Joey Hess
4579dd6201
S3: Improve diagnostics when a remote is configured with exporttree and versioning, but no S3 version id has been recorded for a key.
When public access is used for the remote, it complained that the user
needed to set creds to use it, which was just wrong.

When creds were being used, it fell back from trying to use the version ID
to just accessing the key in the bucket, which was ok for non-export
remotes, but wrong for buckets.

In both cases, display a hopefully useful warning.

This should only come up when an existing S3 remote has been exported
to, and then later versioning was enabled.

Note that it would perhaps be possible to fall back from trying to use
retrieveKeyFile when it fails and instead use retrieveKeyFileFromExport,
which may work when S3 version ID is missing. But there are problems
with that approach; how to tell when retrieveKeyFile has failed due to this
rather than a network problem etc? Anyway, that approach would only work
until the file in the export got overwritten, and then it would no
longer be accessible. And with versioning enabled, the user wants old
versions of objects to remain accessible, so it seems better to warn
about the problem as soon as possible, so they can go back and add S3
version IDs.

This work is supported by the NIH-funded NICEMAN (ReproNim TR&D3) project.
2018-12-06 13:44:37 -04:00
hobbes@b2cacef69071743c3a831e60511062f7e014e52f
06e3cb358d Added a comment 2018-12-06 15:21:38 +00:00
robstewart57@c2d9885829993db7e2755ac086590ab70b55a267
3bc400d28e 2018-12-06 14:14:10 +00:00
xsteadfastx
8e3b73caf7 Added a comment 2018-12-06 09:09:48 +00:00
rygo6@1de1c80e7a49c7ad73ee49cf754f1ccc90fa242a
629f18df9c 2018-12-06 03:47:20 +00:00
StéphaneGL
b6ea79d09e Added a comment 2018-12-05 22:58:57 +00:00
Joey Hess
51d6f38b1c
add news item for git-annex 7.20181205 2018-12-05 16:19:39 -04:00
Joey Hess
1d16605f93
releasing package git-annex version 7.20181205 2018-12-05 16:19:11 -04:00
tritigr
2ba9bf7903 2018-12-05 19:27:40 +00:00
Joey Hess
eb0db3d230
comments 2018-12-05 12:44:09 -04:00
Joey Hess
e658010128
clarify anarcat's change
v7 does not need to be done simulantaneously unless you choose to use
the new unlocked files feature
2018-12-05 12:22:36 -04:00
Joey Hess
8f1701a440
close 2018-12-05 12:14:33 -04:00
michael@ff03af62c7fd492c75066bda2fbf02370f5431f4
d810efe844 Added a comment: Borg vs. restic, some design considerations 2018-12-05 14:36:45 +00:00
xsteadfastx
b30fb7fad7 Added a comment 2018-12-05 09:57:36 +00:00
anarcat
4e5cf647bf Added a comment: happened again 2018-12-04 22:08:36 +00:00
anarcat
11646b1f97 Added a comment 2018-12-04 21:37:54 +00:00
Joey Hess
2ab53b7a6d
comment 2018-12-04 17:31:40 -04:00
anarcat
0155639f2e another v7 oddity? 2018-12-04 21:11:29 +00:00
anarcat
fbd0c57e8a updated the upgrades page, thanks for the clarification! 2018-12-04 21:07:52 +00:00
anarcat
b4329466c3 mention synchronized upgrades limitation 2018-12-04 21:07:11 +00:00
Joey Hess
14e6d7cf2d
comment 2018-12-04 16:55:36 -04:00
anarcat
5e3bb14873 another v7 catch? 2018-12-04 20:41:08 +00:00
Ilya_Shlyakhter
8f87be6622 Added a comment 2018-12-04 19:56:36 +00:00
lukasstraub2@bbbb2ef261a0994edda5f5f55999dfac5998d4e5
2e4b39b307 Added a comment: Workaround 2018-12-04 19:37:38 +00:00
Joey Hess
8d0d00d926
fix typo 2018-12-04 15:23:04 -04:00
Joey Hess
78879b5b36
response 2018-12-04 15:20:40 -04:00
Joey Hess
31d44d5726
Merge branch 'master' of ssh://git-annex.branchable.com 2018-12-04 15:20:00 -04:00
Joey Hess
e83af72e99
remove libghc-stm-dev dep
It moved into ghc, so bump ghc version.
2018-12-04 15:12:07 -04:00
Ilya_Shlyakhter
5c510f6937 fixed markup 2018-12-04 18:58:04 +00:00
Ilya_Shlyakhter
00ccf952e4 added suggestion for encrypting URLs 2018-12-04 18:57:04 +00:00
Ilya_Shlyakhter
ae0196df7e Added a comment 2018-12-04 18:40:02 +00:00
Joey Hess
635692410b
Merge branch 'master' of ssh://git-annex.branchable.com 2018-12-04 14:18:31 -04:00
Joey Hess
ab7746a2ae
annex.cachecreds: New config to allow disabling of credentials caching for special remotes.
Note that it does not prevent storing p2p access tokens or multicast
encryption keys, since those are not cached; the previous commit
established the distinction.

How well this works depends on how often getRemoteCredPair is called and
how expensive it is. In some cases setting this will result in an annoying
number of gpg password prompts and/or slowdowns due to reading creds
from the git-annex branch and decrypting, which could be improved by calling
getRemoteCredPair less often.

This commit was sponsored by Ilya Shlyakhter on Patreon.
2018-12-04 14:16:56 -04:00
Joey Hess
e89bb4361b
distinguish between cached and uncached creds
p2p and multicast creds are not cached the same way that s3 and webdav
creds are. The difference is that p2p and multicast obtain the creds
themselves, as part of a process like pairing. So they're storing the
only extant copy of the creds. In s3 and webdav etc the creds are
provided by the cloud storage provider.

This is a fine difference, but I do think it's a reasonable difference.
If the user wants to prevent s3 and webdav etc creds from being stored
unencrypted on disk, they won't feel the same about p2p auth tokens
used for tor, or a multicast encryption key, or for that matter their
local ssh private key.

This commit was sponsored by Fernando Jimenez on Patreon.
2018-12-04 14:09:18 -04:00
Joey Hess
736ecbe4b8
update 2018-12-04 13:40:50 -04:00
Joey Hess
1308a76bf1
deMaybe credPairRemoteKey
It's always Just
2018-12-04 13:37:43 -04:00
Joey Hess
b184f158a5
response 2018-12-04 13:17:42 -04:00