summaryrefslogtreecommitdiff
path: root/Remote
Commit message (Collapse)AuthorAge
...
| * this should avoid leaking memoryGravatar Joey Hess2014-11-03
| |
| * logic errorGravatar Joey Hess2014-11-03
| |
| * WIP 3Gravatar Joey Hess2014-11-03
| |
| * WIP 2Gravatar Joey Hess2014-11-03
| |
| * WIP try sending using RequestBodyStreamChunkedGravatar Joey Hess2014-11-03
| | | | | | | | | | May not work; if it does this is gonna be the simplest way to get good memory size and progress reporting.
| * link to memory leak bugGravatar Joey Hess2014-11-03
| |
| * improve info display for multipartGravatar Joey Hess2014-11-03
| |
| * fix buildGravatar Joey Hess2014-11-03
| |
| * adjust version checkGravatar Joey Hess2014-11-03
| | | | | | | | | | I assume 0.10.6 will have the fix for the bug I reported, which got fixed in master already..
| * show multipart configuration in git annex info s3remoteGravatar Joey Hess2014-11-03
| |
| * Merge branch 'master' into s3-aws-multipartGravatar Joey Hess2014-11-03
| |\ | |/ |/|
| * finish multipart support using unreleased update to aws lib to yield etagsGravatar Joey Hess2014-11-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Untested and not even compiled yet. Testing should include checks that file content streams through without buffering in memory. Note that CL.consume causes all the etags to be buffered in memory. This is probably nearly unavoidable, since a request has to be constructed that contains the list of etags in its body. (While it might be possible to stream generation of the body, that would entail making a http request that dribbles out parts of the body as the multipart uploads complete, which is not likely to work well.. To limit this being a problem, it's best for partsize to be set to some suitably large value, like 1gb. Then a full terabyte file will need only 1024 etags to be stored, which will probably use around 1 mb of memory.
* | improve uuid mismatch messageGravatar Joey Hess2014-10-28
| |
| * WIP multipart S3 uploadGravatar Joey Hess2014-10-28
| | | | | | | | | | | | | | | | | | | | | | | | I'm a little stuck on getting the list of etags of the parts. This seems to require taking the md5 of each part locally, which doesn't get along well with lazily streaming in the part from the file. It would need to read the file twice, or lose laziness and buffer a whole part -- but parts might be quite large. This seems to be a problem with the API provided; S3 is supposed to return an etag, but that is not exposed. I have filed a bug: https://github.com/aristidb/aws/issues/141
| * fix buildGravatar Joey Hess2014-10-23
| |
| * fix buildGravatar Joey Hess2014-10-23
| |
| * update for aws 0.10's better handling of DNE for HEADGravatar Joey Hess2014-10-23
| | | | | | | | Kept support for older aws, since Debian has 0.9.2 still.
* | rename isIA to configIAGravatar Joey Hess2014-10-23
| | | | | | | | Already done on s3-aws branch, so reduce divergence.
| * fix buildGravatar Joey Hess2014-10-23
| |
| * one last build fix, yes it builds nowGravatar Joey Hess2014-10-23
| |
| * needs type familiesGravatar Joey Hess2014-10-23
| |
| * fix buildGravatar Joey Hess2014-10-23
| |
| * enable frankfurtGravatar Joey Hess2014-10-23
| | | | | | | | The aws library supports the AWS4-HMAC-SHA256 that it requires.
| * Merge branch 'master' into s3-awsGravatar Joey Hess2014-10-23
| |\ | |/ |/|
* | add new frankfurt region to list in webappGravatar Joey Hess2014-10-23
| | | | | | | | | | | | | | But commented out for now, because: The authorization mechanism you have provided is not supported. Please use AWS4-HMAC-SHA256
| * Merge branch 'master' into s3-awsGravatar Joey Hess2014-10-22
| |\ | |/ |/| | | | | Conflicts: Remote/S3.hs
* | show in info whether a remote uses hybrid encryption or notGravatar Joey Hess2014-10-22
| |
* | include creds info for glacier and webdavGravatar Joey Hess2014-10-22
| | | | | | | | | | | | | | | | That and S3 are all that uses creds currently, except that external remotes can use creds. I have not handled showing info about external remote creds because they can have 0, 1, or more separate cred pairs, and there's no way for info to enumerate them or know how they're used. So it seems ok to leave out creds info for external remotes.
* | add internet archive item url to infoGravatar Joey Hess2014-10-21
| |
* | include creds location in infoGravatar Joey Hess2014-10-21
| | | | | | | | | | | | | | | | This is intended to let the user easily tell if a remote's creds are coming from info embedded in the repository, or instead from the environment, or perhaps are locally stored in a creds file. This commit was sponsored by Frédéric Schütz.
* | add per-remote-type infoGravatar Joey Hess2014-10-21
| | | | | | | | | | | | | | | | | | | | Now `git annex info $remote` shows info specific to the type of the remote, for example, it shows the rsync url. Remote types that support encryption or chunking also include that in their info. This commit was sponsored by Ævar Arnfjörð Bjarmason.
* | glacier: Fix pipe setup when calling glacier-cli to retrieve an object.Gravatar Joey Hess2014-10-20
| |
* | S3: Fix embedcreds=yes handling for the Internet Archive.Gravatar Joey Hess2014-10-12
| | | | | | | | | | Before, embedcreds=yes did not cause the creds to be stored in remote.log, but also prevented them being locally cached.
* | indent with tabs not spacesGravatar Joey Hess2014-10-09
| | | | | | | | | | | | | | | | | | | | | | Found these with: git grep "^ " $(find -type f -name \*.hs) |grep -v ': where' Unfortunately there is some inline hamlet that cannot use tabs for indentation. Also, Assistant/WebApp/Bootstrap3.hs is a copy of a module and so I'm leaving it as-is.
* | fix some mixed space+tab indentationGravatar Joey Hess2014-10-09
| | | | | | | | | | | | | | | | | | This fixes all instances of " \t" in the code base. Most common case seems to be after a "where" line; probably vim copied the two space layout of that line. Done as a background task while listening to episode 2 of the Type Theory podcast.
* | deal with old repositories with non-encrypted credsGravatar Joey Hess2014-09-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | See 2fb7ad68637cc4e1092f835055a974f141808ca0 for backstory about how a repo could be in this state. When decryption fails, the repo must be using non-encrypted creds. Note that creds are encrypted/decrypted using the encryption cipher which is stored in the repo, so the decryption cannot fail due to missing gpg keys etc. (For !shared encryptiom, the cipher is iteself encrypted using some gpg key(s), and the decryption of the cipher happens earlier, so not affected by this change. Print a warning message for !shared repos, and continue on using the cipher. Wrote a page explaining what users hit by this bug should do. This commit was sponsored by Samuel Tardieu.
* | glacier, S3: Fix bug that caused embedded creds to not be encypted using the ↵Gravatar Joey Hess2014-09-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | remote's key. encryptionSetup must be called before setRemoteCredPair. Otherwise, the RemoteConfig doesn't have the cipher in it, and so no cipher is used to encrypt the embedded creds. This is a security fix for non-shared encryption methods! For encryption=shared, there's no security problem, just an inconsistentency in whether the embedded creds are encrypted. This is very important to get right, so used some types to help ensure that setRemoteCredPair is only run after encryptionSetup. Note that the external special remote bypasses the type safety, since creds can be set after the initial remote config, if the external special remote program requests it. Also note that IA remotes never use encryption, so encryptionSetup is not run for them at all, and again the type safety is bypassed. This leaves two open questions: 1. What to do about S3 and glacier remotes that were set up using encryption=pubkey/hybrid with embedcreds? Such a git repo has a security hole embedded in it, and this needs to be communicated to the user. Is the changelog enough? 2. enableremote won't work in such a repo, because git-annex will try to decrypt the embedded creds, which are not encrypted, so fails. This needs to be dealt with, especially for ecryption=shared repos, which are not really broken, just inconsistently configured. Noticing that problem for encryption=shared is what led to commit cc54ff9e49260cd94f938e69e926a273e231ef4e, which tried to fix the problem by not decrypting the embedded creds. This commit was sponsored by Josh Taylor.
* | Revert "S3, Glacier, WebDAV: Fix bug that prevented accessing the creds when ↵Gravatar Joey Hess2014-09-18
| | | | | | | | | | | | | | | | | | | | the repository was configured with encryption=shared embedcreds=yes." This reverts commit cc54ff9e49260cd94f938e69e926a273e231ef4e. I can find no basis for that commit and think that I made it in error. setRemoteCredPair always encrypts using the cipher from remoteCipher, even when the cipher is shared.
| * Merge branch 'master' into s3-awsGravatar Joey Hess2014-09-18
| |\ | |/ |/| | | | | | | | | Conflicts: Utility/Url.hs debian/changelog git-annex.cabal
* | WebDav: Fix enableremote crash when the remote already exists. (Bug ↵Gravatar Joey Hess2014-09-17
| | | | | | | | introduced in version 5.20140817.)
* | The annex-rsync-transport configuration is now also used when checking if a ↵Gravatar Joey Hess2014-09-11
| | | | | | | | key is present on a rsync remote, and when dropping a key from the remote.
* | New annex.hardlink setting. Closes: #758593Gravatar Joey Hess2014-09-05
| | | | | | | | | | | | | | | | | | | | * New annex.hardlink setting. Closes: #758593 * init: Automatically detect when a repository was cloned with --shared, and set annex.hardlink=true, as well as marking the repository as untrusted. Had to reorganize Logs.Trust a bit to avoid a cycle between it and Annex.Init.
* | Do not preserve permissions and acls when copying files from one local git ↵Gravatar Joey Hess2014-08-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | repository to another. Timestamps are still preserved as long as cp --preserve=timestamps is supported. This avoids cp -a overriding the default mode acls that the user might have set in a git repository. With GNU cp, this behavior change should not be a breaking change, because git-anex also uses rsync sometimes in the same situation, and has only ever preserved timestamps when using rsync. Systems without GNU cp will no longer use cp -a, but instead just cp. So, timestamps will no longer be preserved. Preserving timestamps when copying between repos is not guaranteed anyway. Closes: #729757
* | use types to enforce that removeAnnex can only be called inside lockContentGravatar Joey Hess2014-08-20
| | | | | | | | | | | | | | | | | | | | | | This fixed one bug where it needed to be and wasn't (in Assistant.Unused). And also found one place where lockContent was used unnecessarily (by drop --from remote). A few other places like uninit probably don't really need to lockContent, but it doesn't hurt to do call it anyway. This commit was sponsored by David Wagner.
* | more lock file refactoringGravatar Joey Hess2014-08-20
| | | | | | | | | | | | | | | | Also fixes a test suite failures introduced in recent commits, where inAnnexSafe failed in indirect mode, since it tried to open the lock file ReadWrite. This is why the new checkLocked opens it ReadOnly. This commit was sponsored by Chad Horohoe.
* | reorganize and refactor lock codeGravatar Joey Hess2014-08-20
| | | | | | | | | | | | | | | | Added a convenience Utility.LockFile that is not a windows/posix portability shim, but still manages to cut down on the boilerplate around locking. This commit was sponsored by Johan Herland.
* | When accessing a local remote, shut down git-cat-file processes afterwards, ↵Gravatar Joey Hess2014-08-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | to ensure that remotes on removable media can be unmounted. Closes: #758630 This does mean that eg, copying multiple files to a local remote will become slightly slower, since it now restarts git-cat-file after each copy. Should not be significant slowdown. The reason git-cat-file is run on the remote at all is to update its location log. In order to add an item to it, it needs to get the current content of the log. Finding a way to avoid needing to do that would be a good path to avoiding this slowdown if it does become a problem somehow. This commit was sponsored by Evan Deaubl.
* | forgot some liftsGravatar Joey Hess2014-08-20
| |
* | Ensure that all lock fds are close-on-exec, fixing various problems with ↵Gravatar Joey Hess2014-08-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | them being inherited by child processes such as git commands. (With the exception of daemon pid locking.) This fixes at part of #758630. I reproduced the assistant locking eg, a removable drive's annex journal lock file and forking a long-running git-cat-file process that inherited that lock. This did not affect Windows. Considered doing a portable Utility.LockFile layer, but git-annex uses posix locks in several special ways that have no direct Windows equivilant, and it seems like it would mostly be a complication. This commit was sponsored by Protonet.
| * Merge branch 'master' into s3-awsGravatar Joey Hess2014-08-15
| |\ | |/ |/| | | | | Conflicts: git-annex.cabal