Commit graph

6064 commits

Author SHA1 Message Date
TW
65713d81fe
Merge pull request #6649 from ThomasWaldmann/key-algo-error-msg-1.1
give a more helpful error msg for unsupported encrypted key format  (1.1)
2022-04-27 11:03:35 +02:00
Thomas Waldmann
2311dac835 give a more helpful error msg for unsupported key format, fixes #6561 2022-04-24 22:28:58 +02:00
Thomas Waldmann
dbe29b5849 give a more helpful error msg for unsupported encrypted key format, fixes #6561 2022-04-24 22:28:46 +02:00
TW
fdb0fa59bc
Merge pull request #6644 from hexagonrecursion/1.1-faq
[1.1] Add a troubleshooting note to the FAQ
2022-04-24 13:57:26 +02:00
Andrey Bienkowski
286c20a87a Add a troubleshooting note to the FAQ 2022-04-24 11:27:32 +03:00
TW
18c8d543fd
Merge pull request #6634 from ThomasWaldmann/update-changes-1.1
update CHANGES
2022-04-20 13:02:32 +02:00
TW
2f9a23c1df
Merge pull request #6635 from ThomasWaldmann/docs-files-cache-1.1
FAQ: add a hint about --debug-topic=files_cache
2022-04-20 13:01:41 +02:00
Thomas Waldmann
761ff5b2fd FAQ: add a hint about --debug-topic=files_cache 2022-04-20 13:01:03 +02:00
Thomas Waldmann
a4bf24ea63 update CHANGES 2022-04-19 23:51:10 +02:00
TW
c2f59c9409
Merge pull request #6631 from ThomasWaldmann/fix-info-authenticated-1.1
info: fix authenticated mode repo to show "Encrypted: No", fixes #6462
2022-04-19 23:38:32 +02:00
Thomas Waldmann
ab2ba210da info: fix authenticated mode repo to show "Encrypted: No", fixes #6462 2022-04-19 22:09:45 +02:00
TW
6804d2c017
Merge pull request #6626 from ThomasWaldmann/issue-5673-1.1
do not load files cache for commands not using it, fixes #5673
2022-04-19 21:58:27 +02:00
TW
6a2ee5d921
Merge pull request #6628 from ThomasWaldmann/fix-files-cache-6353-1.1
fix transaction rollback: use files cache filename as found in txn.active
2022-04-19 21:58:07 +02:00
Thomas Waldmann
9f2beff23b fix transaction rollback: use files cache filename as found in txn.active, fixes #6353 2022-04-19 21:19:21 +02:00
Thomas Waldmann
0ea5171ae6 do not load files cache for commands not using it, fixes #5673 2022-04-19 21:11:52 +02:00
TW
dc4aebde71
diff: support presence change for blkdev, chrdev and fifo items (1.1-maint) (#6625)
diff: support presence change for blkdev, chrdev and fifo items

fixes #6483
2022-04-19 20:55:59 +02:00
TW
0c79bd8e4a
Merge pull request #6621 from ThomasWaldmann/secure-erase-msg-1.1
remove stray punctuation from secure-erase message
2022-04-18 10:01:23 +02:00
TW
8cfd6fc5d7
Merge pull request #6617 from ThomasWaldmann/invalid-repo-msg-1.1
better error msg for defect or unsupported repo configs, fixes #6566
2022-04-18 09:52:11 +02:00
Jakub Wilk
91aab05228 remove stray punctuation from secure-erase message 2022-04-18 09:34:06 +02:00
Thomas Waldmann
8e48ca70f4 better error msg for defect or unsupported repo configs, fixes #6566 2022-04-18 09:29:04 +02:00
TW
eae893c62e
Merge pull request #6590 from ThomasWaldmann/docs-virt-1.1
virtualisation speed tips
2022-04-13 23:24:45 +02:00
Thomas Waldmann
259714eecf virtualisation speed tips 2022-04-13 23:09:26 +02:00
TW
34fe1acece
Merge pull request #6583 from ThomasWaldmann/deleted-key-1.1
load_key: no key is same as empty key, fixes #6441
2022-04-12 20:04:40 +02:00
Thomas Waldmann
6defc50790 load_key: no key is same as empty key, fixes #6441
when migrating from repokey to keyfile, we just store an empty key into the repo config,
because we do not have a "delete key" RPC api. thus, empty key means "there is no key".

here we fix load_key, so that it does not behave differently for no key and empty key:
in both cases, it just returns an empty value.

additionally, we strip the value we get from the config, so whitespace does not matter.

All callers now check for the repokey not being empty, otherwise RepoKeyNotFoundError
is raised.
2022-04-12 19:50:36 +02:00
TW
971bd4825f
Merge pull request #6577 from ThomasWaldmann/repo-tags-docs-1.1
docs: fix values of TAG bytes, fixes #6515
2022-04-12 18:13:17 +02:00
Thomas Waldmann
68c1be2fb6 docs: fix values of TAG bytes, fixes #6515 2022-04-12 17:59:15 +02:00
TW
e330ebd31c
Merge pull request #6541 from ThomasWaldmann/more-robust-iterator-1.1
borg check improvements (1.1)
2022-04-12 17:39:41 +02:00
TW
76e8e4d789
Merge pull request #6559 from bcat/1.1-maint
(docs) 1.1: Recommend umask for passphrase file perms
2022-04-10 14:01:08 +02:00
Jonathan Rascher
75e2efaf32 (docs) Recommend umask for passphrase file perms
The previous sample for creating a ~/.borg-passphrase file creates it first and then chmod's it to 400 permissions. That's probably fine in practice, but means there's a tiny window where the passphrase file is sitting with default permissions (likely world readable, depending on the system umask).

It seems safer to first change the umask to remove all group & world bits (0077) _before_ creating the file. To be polite and avoid messing with the user's previous umask, we do this in a subshell. (Note that umask 0077 leads to a mode of 600 rather than the previous 400, because removing the owner write bit doesn't seem to buy much since the owner can just chmod the file anyway.)
2022-04-09 23:59:27 -05:00
Thomas Waldmann
a0722a92ec check archives: improve error handling for corrupt archive metadata block
this is similar to #4777.

borg check must not crash if an archive metadata block does not decrypt.

Instead, report the archive_id, remove the archive from the manifest and skip to the next archive.
2022-04-07 01:35:35 +02:00
Thomas Waldmann
3f9ae96c7b check archive: make robust_iterator more robust, fixes #4777
borg check must not crash if an archive metadata chunk does not decrypt.

Instead, report the chunk and skip to the next one.
2022-04-07 01:22:34 +02:00
TW
caba5bfa53
Merge pull request #6537 from bket/1.1_fix_#2055
1.1 - Fix OpenBSD symlink mode test failure (#2055)
2022-04-05 19:49:56 +02:00
Björn Ketelaars
bf5c590769 1.1 - Fix OpenBSD symlink mode test failure (#2055)
OpenBSD does not have `lchmod()` causing `os.lchmod` to be unavailable
on this platform. As a result ArchiverTestCase::test_basic_functionality
fails when run manually (#2055).

OpenBSD does have `fchmodat()`, which has a flag that makes it behave
like `lchmod()`. In Python this can be used via `os.chmod(path, mode,
follow_symlinks=False)`.

As of Python 3.3 `os.lchmod(path, mode)` is equivalent to
`os.chmod(path, mode, follow_symlinks=False)`. As such, switching to the
latter is preferred as it enables more platforms to do the right thing.
2022-04-05 18:29:53 +02:00
TW
8497981a72
Merge pull request #6527 from ThomasWaldmann/fix-ipv6-url-parsing-1.1
fix scp repo url parsing for ip v6 addrs, fixes #6526
2022-04-04 20:39:44 +02:00
Thomas Waldmann
20a103ccb9 use same host regex for ssh and scp style, refactor/clean up
although bug #6526 did not show with ssh style URLs, we should
not have different regexes for the host part for ssh and scp style.

thus i extracted the host_re from both and also cleaned up a bit.
2022-04-03 21:38:39 +02:00
Thomas Waldmann
9324f31e60 fix scp repo url parsing for ip v6 addrs, fixes #6526
added a negative lookahead/lookbehind to make sure an ipv6 addr
(enclosed in square brackets) does not get badly matched by the
regex part intended for hostnames and ipv4 addrs only.

the other part of that regex which is actually intended to match
ipv6 addrs only matches if they are enclosed in square brackets.

also added tests for ssh and scp style repo URLs with ipv6 addrs
in brackets.

also: made regex more readable, putting these 2 cases on separate lines.
2022-04-03 21:31:50 +02:00
TW
abd3b476de
Merge pull request #6508 from aspargas2/1.1-maint
1.1-maint backport: delete: add repository id and location to prompt
2022-03-30 12:52:27 +02:00
aspargas2
9f281c266d delete: add repository id and location to prompt
backport of 19c7b85
2022-03-29 22:22:33 -04:00
TW
aeeaf742d4
Merge pull request #6494 from ThomasWaldmann/use-compare_digest-1.1
use hmac.compare_digest instead of ==, fixes 6470
2022-03-26 19:48:30 +01:00
Thomas Waldmann
f8cb7147a7 use hmac.compare_digest instead of ==, fixes 6470 2022-03-26 18:55:48 +01:00
TW
ffbe36639a
Merge pull request #6489 from ThomasWaldmann/update-ubuntu-link-1.1
docs: update link to ubuntu packages, fixes #6485
2022-03-26 18:12:54 +01:00
Thomas Waldmann
26a61c7a87 docs: update link to ubuntu packages, fixes #6485 2022-03-26 18:07:32 +01:00
TW
3163ba69ae
Merge pull request #6433 from hexagonrecursion/1-1-cflags
1.1: Allow extra compiler flags for every extension build
2022-03-10 12:05:48 +01:00
TW
d539f4c1ce
Merge pull request #6434 from hexagonrecursion/1-1-fallthrough
1.1: Make switch fallthrough explicit
2022-03-10 11:58:42 +01:00
James Buren
67a2d3a296 1.1: Make switch fallthrough explicit
This includes a backport of #6426

Testing:
```
git clean -e /.envrc -e /.direnv -fdx \
&& CFLAGS=-Werror=implicit-fallthrough pip -v install -e .
```
2022-03-10 07:48:23 +03:00
Andrey Bienkowski
7e5618d741 1.1: Allow extra compiler flags for every extension build
This is a backport of 820de65562

Note: I had to resort to manually replicating the changes
beacsuse setup.py had undergone a refactoring that was
not backported
2022-03-10 07:25:30 +03:00
TW
111a420420
Merge pull request #6430 from ThomasWaldmann/fix-savefile-mode-1.1
respect umask for files / dirs (1.1)
2022-03-09 19:00:44 +01:00
Thomas Waldmann
988a27c44c ensure_dir: respect umask for created directory modes, fixes #6400
we tried to be very private / secure here, but that created the issue
that a less secure umask (like e.g. 0o007) just did not work.

to make the umask work, we must start from 0o777 mode and let the
umask do its work, like e.g. 0o777 & ~0o007 --> 0o770.

with borg's default umask of 0o077, it usually ends up being 0o700,
so only permissions for the user (not group, not others).
2022-03-09 17:23:36 +01:00
Thomas Waldmann
6a5718691f SaveFile: respect umask for final file mode, fixes #6400 2022-03-09 17:20:43 +01:00
TW
70a3c14313
Merge pull request #6424 from ThomasWaldmann/fix-cython-warnings-1.1
fix "useless trailing comma" cython warnings
2022-03-08 21:58:33 +01:00