git-annex/doc/devblog/day_198__branching_out.mdwn
Joey Hess e213ef310f git-annex (5.20140717) unstable; urgency=high
* Fix minor FD leak in journal code. Closes: #754608
  * direct: Fix handling of case where a work tree subdirectory cannot
    be written to due to permissions.
  * migrate: Avoid re-checksumming when migrating from hashE to hash backend.
  * uninit: Avoid failing final removal in some direct mode repositories
    due to file modes.
  * S3: Deal with AWS ACL configurations that do not allow creating or
    checking the location of a bucket, but only reading and writing content to
    it.
  * resolvemerge: New plumbing command that runs the automatic merge conflict
    resolver.
  * Deal with change in git 2.0 that made indirect mode merge conflict
    resolution leave behind old files.
  * sync: Fix git sync with local git remotes even when they don't have an
    annex.uuid set. (The assistant already did so.)
  * Set gcrypt-publish-participants when setting up a gcrypt repository,
    to avoid unncessary passphrase prompts.
    This is a security/usability tradeoff. To avoid exposing the gpg key
    ids who can decrypt the repository, users can unset
    gcrypt-publish-participants.
  * Install nautilus hooks even when ~/.local/share/nautilus/ does not yet
    exist, since it is not automatically created for Gnome 3 users.
  * Windows: Move .vbs files out of git\bin, to avoid that being in the
    PATH, which caused some weird breakage. (Thanks, divB)
  * Windows: Fix locking issue that prevented the webapp starting
    (since 5.20140707).

# imported from the archive
2014-07-17 11:27:25 -04:00

23 lines
1.3 KiB
Markdown

I have mostly been thinking about gcrypt today.
[This issue](https://github.com/blake2-ppc/git-remote-gcrypt/issues/9)
needs to be dealt with. The question is, does it really make sense to
try to hide the people a git repository is encrypted for? I have
[posted some thoughts](http://git-annex.branchable.com/bugs/using_gpg_encryption_with_multiple_keys_fails/?updated#comment-0c4f679d972c63b0b25b6aa5e851af62)
and am coming to the viewpoint that obscuring the identities of users
of a repository is not a problem git-annex should try to solve itself,
although it also shouldn't get in the way of someone who is able and
wants to do that (by using tor, etc).
Finally, I decided to go ahead and add a gcrypt.publish-participants
setting to git-remote-gcrypt, and make git-annex set that by default when
setting up a gcrypt repository.
Some promising news from the ghc build on arm. I got a working ghc, and
even ghci works. Which would make the template haskell in the webapp etc
avaialble on arm without the current horrible hacks. Have not managed to
build the debian ghc package successfully yet though.
Also, fixed a bug that made `git annex sync` not pull/push with a local
repository that had not yet been initialized for use with git-annex.
Today's work was sponsored by Stanley Yamane.