Michael Eischer
fb4d9b3232
Merge pull request #5125 from restic/patch-release-cherrypicks
...
Prepare patch release
2024-11-03 22:24:49 +01:00
Michael Eischer
7bfe3d99ae
fs: fallback to low privilege security descriptors on access denied
2024-11-03 21:45:52 +01:00
Michael Eischer
d46525a51b
fix double printf usage
2024-11-03 21:44:45 +01:00
Michael Eischer
3800eac54b
prepare-release: improve handling of release from non-master branch
...
The final push command now states the correct branch to push.
2024-11-03 21:44:45 +01:00
Michael Eischer
75f317eaf1
sftp: check for broken connection in Load/List operation
2024-11-03 21:44:45 +01:00
Michael Eischer
b8527f4b38
prune: allow dry-run without taking a lock
2024-11-03 21:44:45 +01:00
Joram Berger
b8b7896d4c
doc: Clarify number of blobs are added
...
The numbers reported as `data_blobs` and `tree_blobs` are not total numbers of blobs but numbers of blobs added with the given snapshot.
2024-11-03 21:42:58 +01:00
Michael Eischer
d0c5b5a9b7
add changelog for fuse fix
2024-11-03 21:42:20 +01:00
Michael Eischer
8aebea7ba2
fuse: test that the same fs.Node is used for the same file
2024-11-03 21:42:20 +01:00
Michael Eischer
0e9716a6e6
fuse: forget fs.Node instances on request by the kernel
...
Forget fs.Node instances once the kernel frees the corresponding nodeId.
This ensures that restic does not run out of memory on large snapshots.
2024-11-03 21:42:19 +01:00
Michael Eischer
de4f8b344e
fuse: add missing type assertion for optional interfaces
2024-11-03 21:41:22 +01:00
Michael Eischer
75ec7d3269
fuse: cache fs.Node instances
...
A particular node should always be represented by a single instance.
This is necessary to allow the fuse library to assign a stable nodeId to
a node. macOS Sonoma trips over the previous, unstable behavior when
using fuse-t.
2024-11-03 21:41:13 +01:00
Michael Eischer
d8e0384940
doc: document safety feature for --target / --delete
2024-11-03 21:38:01 +01:00
Michael Eischer
62222edc4a
Merge pull request #5110 from MichaelEischer/fix-vss-root-volume-patch
...
Fix VSS metadata error (v0.17.2)
2024-11-03 21:28:34 +01:00
Michael Eischer
962279479d
add vss metadata changelog
2024-10-31 22:07:15 +01:00
Michael Eischer
0aee70b496
restic: test path handling of volume shadow copy root path
2024-10-31 22:07:15 +01:00
Michael Eischer
4380627cb7
backup: run test with absolute path
2024-10-31 22:07:15 +01:00
Michael Eischer
e38f6794cd
restic: fix error in fillGenericAttributes for vss volumes
...
Extended attributes and security descriptors apparently cannot be
retrieved from a vss volume. Fix the volume check to correctly detect
vss volumes and just completely disable extended attributes for volumes.
2024-10-31 22:07:15 +01:00
Michael Eischer
f77e67086c
fs: add correct vss support to fixpath
...
Paths that only contain the volume shadow copy snapshot name require
special treatment. These paths must end with a slash for regular file
operations to work.
2024-10-31 22:07:15 +01:00
Alexander Neumann
7eec85b4eb
Set development version for 0.17.2
2024-10-27 16:37:28 +01:00
Alexander Neumann
2fb07dcdb1
Add version for 0.17.2
2024-10-27 16:37:19 +01:00
Alexander Neumann
5dcee7f0a3
Update manpages and auto-completion
2024-10-27 16:37:19 +01:00
Alexander Neumann
44968c7d43
Generate CHANGELOG.md for 0.17.2
2024-10-27 16:37:08 +01:00
Alexander Neumann
dbb5fb9fbd
Prepare changelog for 0.17.2
2024-10-27 16:37:08 +01:00
Michael Eischer
3a4a5a8215
Merge pull request #5102 from MichaelEischer/polish-changelogs
...
Polish patch release changelogs
2024-10-23 18:52:40 +02:00
Michael Eischer
d8d955e0aa
Tweak wording
...
Co-authored-by: rawtaz <rawtaz@users.noreply.github.com>
2024-10-22 20:00:39 +02:00
Michael Eischer
2ce485063f
polish changelogs
2024-10-22 19:48:59 +02:00
Michael Eischer
f72febb34f
Merge pull request #5099 from MichaelEischer/hackport-fix-vss-metadata
...
Hackport "backup: read extended metadata from snapshot"
2024-10-22 19:24:08 +02:00
Michael Eischer
ee9a5cdf70
add vss metadata changelog
2024-10-18 22:51:55 +02:00
Michael Eischer
46dce1f4fa
backup: work around file deletion error in test
2024-10-18 22:51:55 +02:00
Michael Eischer
841f8bfef0
redirect test log output to t.Log()
2024-10-18 22:51:55 +02:00
Michael Eischer
1f5791222a
backup: test that vss backups work if underlying data was removed
2024-10-18 22:51:55 +02:00
Michael Eischer
a7b13bd603
fs: remove file.Name() from interface
...
The only user was archiver.fileSaver.
2024-10-18 22:29:03 +02:00
Michael Eischer
0c711f5605
archiver: use correct filepath in fileSaver for vss
...
When using the VSS FS, then `f.Name()` contained the filename in the
snapshot. This caused a double mapping when calling NodeFromFileInfo.
2024-10-18 22:29:03 +02:00
Michael Eischer
4df2e33568
archiver: properly create node for vss backups
...
Previously, NodeFromFileInfo used the original file path to create the
node, which also meant that extended metadata was read from there
instead of within the vss snapshot.
This change is a temporary solution for restic 0.17.2 and will be
replaced with a clean fix in restic 0.18.0.
2024-10-18 22:26:18 +02:00
Michael Eischer
11c1fbce20
Merge pull request #5098 from MichaelEischer/prepare-patch-release
...
Prepare patch release
2024-10-18 22:20:27 +02:00
Connor Findlay
9553d873ff
backend/azure: Add tests for both token types
...
Add two new test cases, TestBackendAzureAccountToken and
TestBackendAzureContainerToken, that ensure that the authorization using
both types of token works.
This introduces two new environment variables,
RESTIC_TEST_AZURE_ACCOUNT_SAS and RESTIC_TEST_AZURE_CONTAINER_SAS, that
contain the tokens to use when testing restic. If an environment
variable is missing, the related test is skipped.
2024-10-18 21:59:03 +02:00
Connor Findlay
048c3bb240
changelog: Add changes in issue-4004
...
Add changelog entry in the 'unreleased' sub-folder for changes
introduced when fixing issue #4004 .
2024-10-18 21:59:03 +02:00
Connor Findlay
d6e76a22a8
backend/azure: Handle Container SAS/SAT
...
Ignore AuthorizationFailure caused by using a container level SAS/SAT
token when calling GetProperties during the Create() call. This is because the
GetProperties call expects an Account Level token, and the container
level token simply lacks the appropriate permissions. Supressing the
Authorization Failure is OK, because if the token is actually invalid,
this is caught elsewhere when we try to actually use the token to do
work.
2024-10-18 21:59:03 +02:00
Michael Eischer
e3a022f9b5
add irregular files bug changelog
2024-10-18 21:58:04 +02:00
Michael Eischer
fe269c752a
repair snapshots: remove irregular files
2024-10-18 21:57:52 +02:00
Michael Eischer
fc1fc00aa4
backup: exclude irregular files from backup
...
restic cannot backup irregular files as those don't behave like normal
files. Thus skip them with an error.
2024-10-18 21:56:41 +02:00
greatroar
3c82fe6ef5
fs: Include filename in mknod errors
2024-10-18 21:53:15 +02:00
Michael Eischer
986d981bf6
tag: fix swallowed error if repository cannot be opened
2024-10-18 21:50:29 +02:00
Michael Eischer
0df2fa8135
fs: retry preallocate on Linux if interrupted by signal
2024-10-18 21:47:59 +02:00
Roman Inflianskas
49ccb7734c
list: validate subcommand
2024-10-18 21:47:59 +02:00
Roman Inflianskas
491cc65e3a
list: add subcommand completion
2024-10-18 21:47:59 +02:00
Damien Clark
8c1d6a50c1
cache: fix race condition in cache cleanup
...
Fix multiple restic processes executing concurrently and racing to remove obsolete snapshots.
Co-authored-by: Michael Eischer <michael.eischer@fau.de>
2024-10-18 21:47:59 +02:00
Michael Eischer
9386acc4a6
Fix indentation of blockquotes in github release notes
2024-10-18 21:47:59 +02:00
Git'Fellow
5b60d49654
fix: shorten sentence
2024-10-18 21:47:59 +02:00