![]() It’s the act of locking the file that does so. Previously it was stated that git annex will create a symlink. # only creates a branch with the changes. # For each remote we need to run sync in order to actually Git annex sync -content -message="$(date +%F)" # If using rsync, make sure you use -avzAX # If using cp, make sure you use -a to preserve permissions and xattrs ![]() Source "$HOME/.keychain/$HOSTNAME-sh-gpg" 2>/dev/null Source "$HOME/.keychain/$HOSTNAME-sh" 2>/dev/null # Import environment variables SSH_AUTH_SOCK, etc. The following helper script should get you started: #!/bin/bash In order to restore security contexts, you can simply use chcon -R -reference=source_dir/ target_dir/, where source_dir contains the Git-restore-metadata and add them to your PATH. Rename the scripts to git-store-metadata and However, etckeeper has some helper scripts which store and Use git annex unlock since direct mode is deprecatedĪs far as I’m aware, git-annex doesn’t track permissions or xattrs (importantįor SELinux). If you make frequent changes to files you should In v6, once a file is unlocked, it remains unlocked. ![]() Git annex sync needs to be run in each repository, not just one, if you are using a distributed In that case, you should run git annex upgrade Git annex init may not initialize the repository with the latest version. (prefixed with git annex) to any configured repository. Git-annex is a location/metadata tracker that’s built on top of git. This has the advantage of not requiring root privileges. For example, on XFCE this would look like: xfconf-query -c xfce4-power-manager -p /xfce4-power-manager/inactivity-on-ac -s 0 Idle:sleep:shutdown but laptop users will find handle-lid-switchĪlternatively, if you choose not to use systemd-inhibit, you can simply adjust the power Per the documentation, itĬan inhibit a variety of operations. Systemd-inhibit on the other hand will prevent the system from suspending You can run fuser -v /path/to/cron.lock to see what processes are holding So place them insideįlock ensures that if there’s a conflict, the monthly (i.e, full backup) job will take Requires privileges, this cannot be a per-user unit. The time format is correct by using systemd calendar. Read man systemd.time for what format OnCalendar takes. The service files should not have an section. To avoid future issues, make sure you have a permanent hostname. If test -f ~/.keychain/(hostname)-gpg-fish Keychain -agents gpg,ssh -gpg2 -eval id_rsa some_gpg_key_id ![]() For Bash, this will look like: # Environment variables automatically sourced, no need to do it manually hereĮval `keychain -agents gpg,ssh -gpg2 -eval id_rsa some_gpg_key_id` To invoke Keychain from your shell startup scripts. You need to explicitly specify which keys to use (i.e, id_rsa). Unless specified, Keychain will not start gpg-agent nor use gpg2. Since it’s just a shell script, installation is The latest version at the time of writing At the time of writing, Fedora ships version 2.8.0, Variables ( SSH_AUTH_SOCK, etc.) that can be sourced for non-interactive It will cache your keys and export environment Then reload the GPG agent (either echo RELOADAGENT | gpg-connect-agent or For the latter, you may opt to keep your passphraseĬached so that you can run the backups unattended. In cleartext, but if it’s in your crontab or protected with 700 permissions If you go with the former route, your passphrase will be You can then either use the PASSPHRASE environment variable or the In order to instruct Duplicity to use gpg2, pass -gpg-binary='gpg2'. Match /path/to/gopher, even when not using a wildcard. Include/exclude patterns, specifying a path like /path/to/go will also I’m not sure if this is a bug or not, but you should be aware that for
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |