Bug#346040: backupninja: [PATCH] duplicity local backup support

2008-06-24 Thread intrigeri
tags 346040 + fixed-upstream
thanks

Hello,

I’ve implemented support for all duplicity-supported transports other
than SSH, the way Joey Hess suggested in
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483712 ; this is in
upstream SVN trunk r568 [1].

All interested parties, please test this patch with the transports you
need before we release backupninja 0.9.6 for inclusion in Debian
Lenny. If this is not an option for you, just wait for the release :)

[1] https://code.autistici.org/trac/backupninja/changeset/568

Bye,
--
  intrigeri [EMAIL PROTECTED]



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#346040: backupninja: [PATCH] duplicity local backup support

2007-05-15 Thread intrigeri
intrigeri wrote (18 Jan 2007 23:21:28 GMT) :
 The Anarcat wrote (10 Jan 2007 17:53:13 GMT) :
 I did some work to get there. I have attached a patch that adds a
 protocol option, that, if unset defaults to scp.

 Thanks for this patch, which I'd like to apply upstream once it's
 documented, added to example.dup, and dealt with by ninjahelper ;
 I won't do this myself, but I can offer help to :
   - take care of the remote setup tests ;
   - review your patch next versions, as I'm doing for this one.

 It's not quite clean yet, because it lacks documentation and it's
 really just a flag right now. Not sure what would happen if you'd
 enter, say, ssh or (!) ftp as a protocol. :) Maybe backupninja
 should check for this...

 Yes, I think it's necessary to test if the protocol option has a valid
 value, and exit with an error if this is not the case : this would at
 least unveil some typos in configuration files... e.g. if I wrote
 protocol = fole, I would like to be informed of it in clear terms,
 and not simply by seeing that a scp connection I did not expect to
 happen failed.

 I also haven't tested what happens if you *don't* enter a protocol (or
 put scp). I guess it will behave fine, but I don't have a remote
 setup to do formal testing.

 The test I recommend above would also cover this case, IMHO.

Any news from this, Anarcat ?

Ciao,
-- 
  intrigeri [EMAIL PROTECTED]
  | gnupg key @ http://intrigeri.boum.org/intrigeri.asc
  | We're dreaming of something else.
  | Something more clandestine, something happier.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#346040: backupninja: [PATCH] duplicity local backup support

2007-05-15 Thread The Anarcat
On Tue, May 15, 2007 at 11:41:54AM +0200, intrigeri wrote:
 Any news from this, Anarcat ?

We're not using duplicity within backupninja anymore, so I could find
time to work on this again, and I do not think I will have any in a
forseeable future.

Sorry...

A.


signature.asc
Description: Digital signature


Bug#346040: backupninja: [PATCH] duplicity local backup support

2007-01-19 Thread intrigeri
Hello,

The Anarcat wrote (10 Jan 2007 17:53:13 GMT) :
 I did some work to get there. I have attached a patch that adds a
 protocol option, that, if unset defaults to scp.

Thanks for this patch, which I'd like to apply upstream once it's
documented, added to example.dup, and dealt with by ninjahelper ;
I won't do this myself, but I can offer help to :
  - take care of the remote setup tests ;
  - review your patch next versions, as I'm doing for this one.

 It's not quite clean yet, because it lacks documentation and it's
 really just a flag right now. Not sure what would happen if you'd
 enter, say, ssh or (!) ftp as a protocol. :) Maybe backupninja
 should check for this...

Yes, I think it's necessary to test if the protocol option has a valid
value, and exit with an error if this is not the case : this would at
least unveil some typos in configuration files... e.g. if I wrote
protocol = fole, I would like to be informed of it in clear terms,
and not simply by seeing that a scp connection I did not expect to
happen failed.

 I also haven't tested what happens if you *don't* enter a protocol (or
 put scp). I guess it will behave fine, but I don't have a remote
 setup to do formal testing.

The test I recommend above would also cover this case, IMHO.

Thanks, again :)

Ciao,
-- 
  intrigeri [EMAIL PROTECTED]
  | gnupg key @ http://intrigeri.boum.org/intrigeri.asc
  | That there, it's not me.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#346040: backupninja: [PATCH] duplicity local backup support

2007-01-10 Thread The Anarcat
Package: backupninja
Followup-For: Bug #346040

Hi.

I did some work to get there. I have attached a patch that adds a
protocol option, that, if unset defaults to scp.

It's not quite clean yet, because it lacks documentation and it's
really just a flag right now. Not sure what would happen if you'd
enter, say, ssh or (!) ftp as a protocol. :) Maybe backupninja
should check for this...

I also haven't tested what happens if you *don't* enter a protocol (or
put scp). I guess it will behave fine, but I don't have a remote
setup to do formal testing.


-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-686
Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8)
--- dup.orig2006-04-08 22:12:35.0 +
+++ dup 2007-01-10 17:23:27.0 +
@@ -7,6 +7,7 @@
 getconf options
 getconf testconnect yes
 getconf nicelevel 0
+getconf protocol scp
 
 setsection gpg
 getconf password
@@ -69,10 +70,16 @@
 
 ### COMMAND-LINE MANGLING ###
 
-scpoptions=$sshoptions
-[ $bandwidthlimit == 0 ] || scpoptions=$scpoptions -l $bandwidthlimit
+if [ $protocol != file ]; then
+ scpoptions=$sshoptions
+ [ $bandwidthlimit == 0 ] || scpoptions=$scpoptions -l $bandwidthlimit
+fi
+
+execstr=$options --no-print-statistics 
 
-execstr=$options --no-print-statistics --scp-command 'scp $scpoptions' 
--ssh-command 'ssh $sshoptions' 
+if [ $protocol != file ]; then
+ execstr=${execstr}--scp-command 'scp $scpoptions' --ssh-command 'ssh 
$sshoptions' 
+fi
 
 # deal with symmetric or asymmetric (public/private key pair) encryption
 if [ -n $encryptkey ]; then
@@ -108,7 +115,11 @@
 execstr=${execstr}--full 
 fi
 
-execstr_serverpart=scp://[EMAIL PROTECTED]/$destdir
+if [ $protocol == file ]; then
+execstr_serverpart=$protocol:///$destdir
+else
+execstr_serverpart=$protocol://[EMAIL PROTECTED]/$destdir
+fi
 execstr_clientpart=/
 
 ### SOURCE ###