Commit graph

10451 commits

Author SHA1 Message Date
gerta
4176634d8d Added a comment 2021-03-21 11:56:27 +00:00
Lukey
5a8b9a57a8 Added a comment 2021-03-20 18:28:51 +00:00
Lukey
2021c31be7 Added a comment 2021-03-20 17:33:32 +00:00
gerta
f695a8e128 Bug: Importing into nested directory overwrites files? 2021-03-20 07:29:12 +00:00
Ilya_Shlyakhter
a76f16cd8d added bug report about fsck failing on dead keys missing from require-everything repos 2021-03-18 18:58:27 +00:00
jwrauch
81c51fa538 2021-03-17 18:59:04 +00:00
mih
1886fa420f Added a comment 2021-03-17 17:03:35 +00:00
Joey Hess
b0bf620b2b
comment 2021-03-17 11:29:57 -04:00
yarikoptic
3ae0552b64 Added a comment 2021-03-17 14:56:20 +00:00
Joey Hess
f9e73e23f2
comment 2021-03-17 10:22:38 -04:00
Joey Hess
8c9ab9752b
comment 2021-03-17 09:44:31 -04:00
Joey Hess
db95b94251
Merge branch 'master' of ssh://git-annex.branchable.com 2021-03-17 09:42:27 -04:00
Joey Hess
0e44c252c8
avoid getting creds from environment during autoenable
When autoenabling special remotes of type S3, weddav, or glacier, do not
take login credentials from environment variables, as the user may not be
expecting the autoenable to happen, and may have those set for other
purposes.
2021-03-17 09:41:12 -04:00
mih
f1bff235e6 Added a comment: Works! 2021-03-17 08:20:10 +00:00
Joey Hess
34a49661d4
comment 2021-03-16 15:12:33 -04:00
Joey Hess
69dd214d59
comment 2021-03-16 14:26:41 -04:00
Joey Hess
3337f7c272
fix exporting when the file is in the top of the repo
takeDirectory "foo" is ".", and that will confuse webdav, so only
use that code path when there is a subdirectory.
2021-03-16 14:17:29 -04:00
yarikoptic
4a2d148599 fixed formatting 2021-03-16 17:43:16 +00:00
yarikoptic
ff95449e79 reporting on the negative effect of AWS_ variables for access to public S3 bucket 2021-03-16 17:38:29 +00:00
yarikoptic
681f9e1a0c 2021-03-15 22:50:04 +00:00
0xloem@0bd8a79a57e4f0dcade8fc81d162c37eae4d6730
f9a5a2ec05 2021-03-15 06:45:09 +00:00
mih
4bcab9efbc Added a comment: 4shared-specific issue 2021-03-13 16:26:14 +00:00
mih
a760909a0d Added a comment: Confirm fix 2021-03-13 16:23:36 +00:00
mih
2cbf8226d5 Added a comment: Progress report 2021-03-13 16:19:19 +00:00
mih
55241b7bdf Added a comment: Thx! 2021-03-13 16:05:52 +00:00
Joey Hess
4f49c29d20
webdav: store temp file in same collection as the final export location
This may work better in some webdav server that gets confused at
cross-collection renamed. I don't know, let's find out.

The only real downside of doing this is that the temp files are not all
in the top-level collection, in case an interrupted run leaves one
behind. But that does not seem especially significant.
2021-03-12 14:52:24 -04:00
Joey Hess
6481991208
export --json: Fill in the file field
Like import was using ActionItemWorkTreeFile, it's ok to use it for export,
even though it might not correspond with a file in the work tree.
And renamed it to ActionItemTreeFile to make that clearer.

Note that when an export has to rename files, it still uses
ActionItemOther, so file will still be null in that case, but as no file is
being transferred, that seems ok.
2021-03-12 14:11:31 -04:00
Joey Hess
f87c63d998
Merge branch 'master' of ssh://git-annex.branchable.com 2021-03-12 13:33:48 -04:00
Joey Hess
1cb154f457
avoid importing deleting submodule
import: When the previously exported tree contained a submodule,
preserve it in the imported tree so it does not get deleted.

The export exclude log, which was used for non-preferred content,
now also includes the submodules. Since the log format is git ls-tree
output, this does not break backwards compatibility.
2021-03-12 13:31:21 -04:00
mih
6396da95e9 2021-03-12 17:13:29 +00:00
Joey Hess
f2a425bd92
export: When a submodule is in the tree to be exported, skip it. 2021-03-12 12:29:18 -04:00
Joey Hess
f6a6148baf
comment 2021-03-12 12:02:06 -04:00
mih
d934a4f4f8 2021-03-12 12:24:46 +00:00
mih
58413168d4 2021-03-12 11:00:53 +00:00
mih
58db7bb16d 2021-03-12 09:33:24 +00:00
Joey Hess
1d7fa63149
Added support for git-remote-gcrypt's rsync URIs
Which access a remote using rsync over ssh, and which git pushes to much
more efficiently than ssh urls.

There was some old partial support for rsync URIs from 2013, but it seemed
incomplete, and did not use rsync over ssh. Weird.

I'm not sure if there's any remaining benefit to using the non-rsync url
forms with gcrypt, now that this is implemented? Updated docs to encourage
using the rsync urls.

This commit was sponsored by Svenne Krap on Patreon.
2021-03-09 15:58:09 -04:00
Joey Hess
15891441f1
close 2021-03-09 14:00:11 -04:00
Joey Hess
1facddbfae
close long-fixed bug 2021-03-09 13:58:22 -04:00
Joey Hess
e07eabbf7f
Fix support for local gcrypt repositories with a space in their URI
Git.Remote.parseRemoteLocation had a hack to handle URIs that contained
characters like spaces, which is something git unfortunately allows
despite not being a valid URI. However, that hack looked for "//" to
guess something was an URI, and these gcrypt URIs, being to a local
path, don't contain that. So instead escape all illegal characters and
check if the resulting thing is an URI.

And that was already done by Git.Construct.fromUrl, so
internally the gcrypt URI with a space looks like "gcrypt::foo%20bar"
and that needs to be de-escaped when converting back from URI to local
repo path.

This change might also allow a few other almost-valid URIs to be handled
as URIs by git-annex. None that contain "//" will change, and any
behavior change should result in git-annex doing closer to a right thing
than it did before, probably.

This commit was sponsored by Noam Kremen on Patreon.
2021-03-09 12:49:51 -04:00
Joey Hess
d3578f3b66
close as dup 2021-03-09 11:48:41 -04:00
tomdhunt
3639ce1a99 2021-03-08 19:07:19 +00:00
tomdhunt
55f7eae066 2021-03-08 18:40:10 +00:00
Joey Hess
deac6f12b5
forgot to add this comment earlier 2021-03-05 12:40:39 -04:00
kyle
324f2c06c5 Added a comment: thanks 2021-03-02 20:51:53 +00:00
Joey Hess
a14001785e
fix --branch combined with --unlocked or --locked
Since it's using git ls-tree anyway, can just look at the file modes to see
if they're unlocked or are symlinks.
2021-03-02 13:47:27 -04:00
Joey Hess
25e4ab7e81
Prevent combinations of options such as --all with --include
Previously such nonsensical combinations always treated the matching option
as if it didn't match.

For now, made find --branch refuse matching options that need a
filename, because one is not provided to them in a way they'll use.
There's an open bug report to support it, but making it error out is
better than the old behavior of not finding what it was asked to.

Also, made --mimetype combined with eg --all work, by looking at the
object file when operating on keys.
2021-03-01 16:25:23 -04:00
Joey Hess
7a089f05b2
move comment to correct bug 2021-03-01 15:24:21 -04:00
Joey Hess
0482424fad
analysis 2021-03-01 13:36:18 -04:00
arelius@a7e47ae13cb3452464261e3a99bfe6d2c25895fd
c802c0685e Added a comment 2021-02-25 21:46:22 +00:00
kyle
6a98e69f2f 2021-02-24 22:37:06 +00:00