4ed0e5f35a
Merge pull request #882 from earlchew/issue-817
...
[curl] Assume long encryption keys are base64 encoded
2019-01-06 17:29:04 +09:00
fd6b37d3da
Merge pull request #877 from gaul/aws/credentials
...
Check arguments and environment before .aws/creds
2019-01-06 17:03:11 +09:00
56e24de0d4
Merge pull request #870 from gaul/typos
...
Correct typos in command-line parsing
2019-01-06 16:21:46 +09:00
2780043a7d
Merge pull request #856 from gaul/doc/icon
...
Add icon for s3fs
2019-01-06 15:54:24 +09:00
54c9e48bb7
Merge pull request #874 from gaul/cppcheck-1.86
...
Address cppcheck 1.86 errors
2019-01-06 15:20:28 +09:00
ed5795eead
[curl] Assume long encryption keys are base64 encoded
...
Correct tabs and whitespace.
Signed-off-by: Earl Chew <earl_chew@yahoo.com >
2019-01-05 21:08:41 +00:00
3d225163f8
Correct typos in command-line parsing
...
Also fix stray macOS references. References #869 .
2019-01-02 14:40:57 -08:00
0569cec3ea
Check arguments and environment before .aws/creds
...
Fixes #857 . Fixes #864 .
2018-12-20 15:51:32 -08:00
a2f8ac535e
Address cppcheck 1.86 errors
...
Lifetime, shadowing, and unused variables. Found via the Travis macOS
builder.
2018-12-20 14:56:31 -08:00
29355d75b0
Add icon for s3fs
...
This is suitable for the s3fs-fuse organization.
2018-12-15 17:12:28 -08:00
d9e89deef6
Merge pull request #865 from orozery/multihead_warning_check
...
fix multihead warning check
2018-11-29 20:53:47 +09:00
6b051eac47
Merge pull request #866 from Basavaraju013/master
...
Multi-arch support for ppc64le
2018-11-29 20:37:02 +09:00
da997de918
Merge pull request #861 from mcgitty/patch-1
...
Add 'profile' option to command line help.
2018-11-29 20:15:01 +09:00
d97094fb8d
Multi-support for ppc64le
2018-11-28 05:15:09 -06:00
b91fc5409e
fix multihead warning check
2018-11-28 09:54:02 +02:00
3c970646d1
Add 'profile' option to command line help.
2018-11-19 08:26:23 -08:00
a92668ae78
Merge pull request #859 from gaul/upload-remove-batching
...
Upload S3 parts without batching
2018-11-18 22:27:20 +09:00
88cd8feb05
Upload S3 parts without batching
...
Previously s3fs would issue a batch of uploads and wait for all to
succeed before issuing the next batch. Now it issues the first batch
and only waits for a single part to succeed before uploading the next
part. This can improve performance when one part lags due to network
errors. Fixes #183 .
2018-11-16 18:32:38 -08:00
91c16f826a
Merge pull request #855 from gaul/readme/stackoverflow
...
Include StackOverflow in FAQs
2018-11-14 22:32:10 +09:00
d4d60ff315
Include StackOverflow in FAQs
2018-11-13 22:19:17 -08:00
e8033f96de
Merge pull request #853 from gaul/readme-tilde
...
Replace ~ with ${HOME} in examples
2018-11-11 11:47:44 +09:00
5fba542a29
Merge pull request #852 from gaul/aws-credentials-file
...
Allow credentials from ${HOME}/.aws/credentials
2018-11-11 11:37:38 +09:00
44de3ffa05
Merge pull request #851 from gaul/list-object-max-keys
...
Correctly compare list_object_max_keys
2018-11-11 11:26:31 +09:00
2efa6df028
Merge pull request #849 from gaul/readme
...
Correct typo
2018-11-11 11:17:05 +09:00
9e530c86ae
Allow credentials from ${HOME}/.aws/credentials
...
This matches the configuration from popular tools like AWS CLI and
allows multiple profile names via -o profile=name. The existing
credential mechanisms continue to work. Fixes #822 .
2018-11-04 17:47:07 -08:00
95857733a1
Replace ~ with ${HOME} in examples
...
Several of these do not work since the shell does not replace ~ in the
middle of a token, e.g., -o passwd=~/.passwd . Replace all of them
for consistency. Fixes #836 .
2018-11-04 17:45:16 -08:00
664f910083
Correctly compare list_object_max_keys
...
Previously this did not allow an argument. Fixes #843 .
References #793 .
2018-11-04 10:49:35 -08:00
735e4b0848
Correct typo
2018-10-29 21:42:48 -07:00
e8d76a6f58
Merge pull request #840 from juliogonzalez/macOS
...
Replace all mentions to MacOS X to macOS
2018-10-28 20:33:51 +09:00
0a6926be54
Merge pull request #835 from juliogonzalez/generic-compilation
...
Make the compilation instructions generic
2018-10-28 20:00:21 +09:00
830a971bde
Replace all mentions to MacOS X to macOS
2018-10-14 23:23:19 +02:00
4779d14d7d
Make the compilation instructions generic
2018-10-08 22:27:01 +02:00
8929a27a24
Merge pull request #834 from juliogonzalez/issue-improvements
...
Improve template for issues
2018-10-09 00:37:20 +09:00
eea624c171
Merge pull request #833 from juliogonzalez/doc
...
New installation instructions for Fedora >= 27 and CentOS7
2018-10-09 00:05:36 +09:00
cdaf4a9674
Merge branch 'master' into doc
2018-10-08 23:56:20 +09:00
6fe92d5ed6
Merge pull request #832 from gaul/hex
...
Simplify hex conversion
2018-10-08 23:03:42 +09:00
8649a68766
Merge pull request #831 from JoohnSF/onezone_ia_support
...
Add support for storage class ONEZONE_IA.
2018-10-08 22:57:12 +09:00
af005b6e5e
Merge pull request #826 from juliogonzalez/centos-setup
...
For RPM distributions fuse-libs is enough
2018-10-08 22:50:29 +09:00
b19d2ae78f
Improve template for issues
2018-10-07 01:20:10 +02:00
5634f9bdcd
New installation instructions for Fedora >= 27 and CentOS7
2018-10-07 00:52:45 +02:00
c703fa15c0
Simplify hex conversion
...
Addresses GCC 8 warning:
common_auth.cpp: In function ‘std::__cxx11::string s3fs_sha256sum(int, off_t, ssize_t)’:
common_auth.cpp:84:12: warning: ‘char* strncat(char*, const char*, size_t)’ output may be truncated copying 2 bytes from a string of length 2 [-Wstringop-truncation]
strncat(sha256, hexbuf, 2);
2018-10-01 19:08:27 -07:00
d9c106cfde
Add support for storage class ONEZONE_IA.
2018-09-30 14:27:31 +02:00
203f78fdae
For RPM distributions fuse-libs is enough
2018-09-23 19:35:17 +02:00
c5af62b023
Merge pull request #820 from gaul/big-writes
...
Enable big writes if capable
2018-09-17 17:24:06 +09:00
dcd70daf48
Merge pull request #819 from soulprovidr/master
...
#691 : Made instructions for creating password file more obvious.
2018-09-17 17:01:53 +09:00
8263919b0e
Merge pull request #812 from mapreri/typo
...
Fix typo s/mutliple/multiple/
2018-09-17 16:52:48 +09:00
97488e603f
Merge pull request #804 from DreamFlasher/patch-2
...
add Backblaze B2
2018-09-17 16:43:55 +09:00
41c23adb0e
[curl] Assume long encryption keys are base64 encoded
...
Amazon SSE-C https://tinyurl.com/ychug4cg writes:
> Use this header to provide the 256-bit, base64-encoded encryption key
> for Amazon S3 to use to encrypt or decrypt your data.
It seems likely that future keys would be as long, or longer, so
this change assumes that text longer than 32 characters are keys
that are base64 encoded.
Signed-off-by: Earl Chew <earl_chew@yahoo.com >
2018-09-16 21:23:22 +00:00
a85183d42c
Enable big writes if capable
...
Fixes #813 .
2018-09-10 22:21:51 -07:00
45b67b9604
#691 : Made instructions for creating password file more obvious.
2018-09-09 23:11:12 -05:00