sshto is my own tool I can probably have it cope with this
mangling of my target string into -l foo bah, and undo it.
But WHY does rsync believe this is desirable, or even necessary?
Cheers,
--
Cameron Simpson c...@zip.com.au DoD#743
http://www.cskk.ezoshosting.com/cs/
If NT is the answer, you
the original question:
|
| On 10/19/11 03:40, Cameron Simpson wrote:
| Why does rsync believe it knows more about the use of the token
| to the left of the colon than the program which will be used as
| the remote connection?
|
| [...]
|
| what it invokes is:
|
| sshto -l cameron
On 19Oct2011 22:14, Brian K. White br...@aljex.com wrote:
| On 10/19/2011 6:58 PM, Cameron Simpson wrote:
| On 19Oct2011 12:02, Benjamin R. Haskellrs...@benizi.com wrote:
| | rsync has to parse the URL you're passing. The fact that it then
| | takes that and runs something like `$RSYNC_RSH -l
to the card device, _outside the filesystem_,
can should incompleteness. But that's not what the OP is doing AFAIK.
Cheers,
--
Cameron Simpson c...@zip.com.au DoD#743
http://www.cskk.ezoshosting.com/cs/
Some people have all the luck. When I find the guy with mine, I'm gonna
kick his teeth
no
changes of any kind to the target (yes, I know -n will do that too:-)
Any thoughts? I would have hoped the first (the no-op) would do,
and feel that maybe it should at least elicit an error message.
Cheers,
--
Cameron Simpson c...@zip.com.au DoD#743
http://www.cskk.ezoshosting.com/cs/
Out
expecting that the sshd on the remote system is not setting
$SSH_ORIGINAL_COMMAND.
What version of ssh is being run on the remote system?
Test mechanism:
ssh host env
and see what is there.
Cheers,
--
Cameron Simpson [EMAIL PROTECTED] DoD#743
http://www.cskk.ezoshosting.com/cs/
Gross
On 08Jun2005 08:38, Wayne Davison [EMAIL PROTECTED] wrote:
| On Wed, Jun 08, 2005 at 02:14:05PM +1000, Cameron Simpson wrote:
| in short, rsync is seeing the [EMAIL PROTECTED] and invoking:
| ssh ali -l root rsync-daemon-invocation...
|
| This should only happen if remsh is present on your
command itself has
permitted this to go unnoticed.
Personally I'm of the opinion that rsync shouldn't parse the
[EMAIL PROTECTED]: prefix at all (other than detecting it), and should not
break it into -l user and host.
Can someone elucidate the reasoning behind this change?
Cheers,
--
Cameron
this.
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
I will not do it as a hack I will not do it for my friends
I will not do it on a MacI will not write for Uncle Sam
I will not do it on weekends I won't do ADA, Sam-I-Am
- Gregory Bond [EMAIL
that be error != 0 ?
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
There's no need to worry about death, it will not happen in your lifetime.
- Raymond Smullyan
On Fri, Dec 07, 2001 at 09:00:05AM -0600, Dave Dykstra [EMAIL PROTECTED] wrote:
| On Sat, Dec 08, 2001 at 12:05:44AM +1100, Martin Pool wrote:
| On 7 Dec 2001, Cameron Simpson [EMAIL PROTECTED] wrote:
| Please don't take this path - ownerships on symlinks are a pretty
| meaningless concept
, or will.
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
Machine, you are about to be lobotomised, please don't take it personally. It
happens to the best of us. Then they become managers.
- [EMAIL PROTECTED] (Peter Evans)
long offended me that the default chown/chgrp/chmod calls follow links
- to my mind the _only_ system calls that should follow links are open() and
chdir(). It would have made for a much saner and safer world.
/RANT
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs
,
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
If you lie to the compiler, it will get its revenge.- Henry Spencer
) or any other arbitrary post-sync action?
Bearing in mind, o those-wanting-chown-and-chgrp, that for myself, were
I to want this, I'd perhaps only want chown and not chgrp (I don't mean
to lack one feature, I mean only using one feature).
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http
, whatever) afresh on the new session?
That way we could do SMTP over SSL etc etc transparently: clients connect,
say SSL, if rejected either fall back or fall out, and if accepted
then away we all go.
Is there some technical reason for not doing things this way?
--
Cameron Simpson, DoD#743
very annoying that it seems
not to try the -i key _first_, or preferably _only_.
Can you a) send me that ssh -v transcript and b) tell me which key it
does get in with? You don't perchance have phraseless identity key do you?
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http
, repeatedly. Not any more.
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
If it can't be turned off, it's not a feature. - Karl Heuer
exclusion list for each run.
Cheers,
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
When asked about his crash entering Daytona's chicane this year, Dale
Quartely said I saw Elvis. You know you're in trouble when you see Elvis
because the next thing you see is God.
zero
- both sides different and -n used - non-zero
- both sides different, no -n, successful update - zero
- both sides different, no -n, unsuccessful update - non-zero
This doesn't seem to be the case.
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http
for a complete run.
| Now the big question : How long will next run take (most likely, only a few
| files has changed) ?
Hopefully only a little less than 2 hours (assuming negligible changes).
--
Cameron Simpson, DoD#743[EMAIL PROTECTED]http://www.zip.com.au/~cs/
It is a tale told by an idiot
21 matches
Mail list logo