2
2
mirror of https://github.com/octoleo/restic.git synced 2024-11-26 14:56:29 +00:00

More documentation fixes

This commit is contained in:
Alexander Neumann 2015-08-22 15:08:35 +02:00
parent b6872fb454
commit e0e9cd8680

View File

@ -12,7 +12,7 @@ several subdirectories. A repository implementation must be able to fulfill a
number of operations, e.g. list the contents. number of operations, e.g. list the contents.
*Blob*: A Blob combines a number of data bytes with identifying information *Blob*: A Blob combines a number of data bytes with identifying information
like the SHA256 hash of the data and its length. like the SHA-256 hash of the data and its length.
*Pack*: A Pack combines one or more Blobs, e.g. in a single file. *Pack*: A Pack combines one or more Blobs, e.g. in a single file.
@ -315,9 +315,8 @@ Trees and Data
-------------- --------------
A snapshot references a tree by the SHA-256 hash of the JSON string A snapshot references a tree by the SHA-256 hash of the JSON string
representation of its contents. Trees are saved in a subdirectory of the representation of its contents. Trees and data are saved in pack files in a
directory `trees`. The sub directory's name is the first two characters of the subdirectory of the directory `data`.
filename the tree object is stored in.
The command `restic cat tree` can be used to inspect the tree referenced above: The command `restic cat tree` can be used to inspect the tree referenced above:
@ -464,8 +463,8 @@ The restic backup program guarantees the following:
* Accessing the unencrypted content of stored files and meta data should not * Accessing the unencrypted content of stored files and meta data should not
be possible without a password for the repository. Everything except the be possible without a password for the repository. Everything except the
`version` and `id` files and the meta data included for informational meta data included for informational purposes in the key files is encrypted and
purposes in the key files is encrypted and authenticated. authenticated.
* Modifications (intentional or unintentional) can be detected automatically * Modifications (intentional or unintentional) can be detected automatically
on several layers: on several layers: