Commit Graph

1065 Commits

Author SHA1 Message Date
4ed0e5f35a Merge pull request #882 from earlchew/issue-817
[curl] Assume long encryption keys are base64 encoded
2019-01-06 17:29:04 +09:00
fd6b37d3da Merge pull request #877 from gaul/aws/credentials
Check arguments and environment before .aws/creds
2019-01-06 17:03:11 +09:00
56e24de0d4 Merge pull request #870 from gaul/typos
Correct typos in command-line parsing
2019-01-06 16:21:46 +09:00
2780043a7d Merge pull request #856 from gaul/doc/icon
Add icon for s3fs
2019-01-06 15:54:24 +09:00
54c9e48bb7 Merge pull request #874 from gaul/cppcheck-1.86
Address cppcheck 1.86 errors
2019-01-06 15:20:28 +09:00
ed5795eead [curl] Assume long encryption keys are base64 encoded
Correct tabs and whitespace.

Signed-off-by: Earl Chew <earl_chew@yahoo.com>
2019-01-05 21:08:41 +00:00
3d225163f8 Correct typos in command-line parsing
Also fix stray macOS references.  References #869.
2019-01-02 14:40:57 -08:00
0569cec3ea Check arguments and environment before .aws/creds
Fixes #857.  Fixes #864.
2018-12-20 15:51:32 -08:00
a2f8ac535e Address cppcheck 1.86 errors
Lifetime, shadowing, and unused variables.  Found via the Travis macOS
builder.
2018-12-20 14:56:31 -08:00
29355d75b0 Add icon for s3fs
This is suitable for the s3fs-fuse organization.
2018-12-15 17:12:28 -08:00
d9e89deef6 Merge pull request #865 from orozery/multihead_warning_check
fix multihead warning check
2018-11-29 20:53:47 +09:00
6b051eac47 Merge pull request #866 from Basavaraju013/master
Multi-arch support for ppc64le
2018-11-29 20:37:02 +09:00
da997de918 Merge pull request #861 from mcgitty/patch-1
Add 'profile' option to command line help.
2018-11-29 20:15:01 +09:00
d97094fb8d Multi-support for ppc64le 2018-11-28 05:15:09 -06:00
b91fc5409e fix multihead warning check 2018-11-28 09:54:02 +02:00
3c970646d1 Add 'profile' option to command line help. 2018-11-19 08:26:23 -08:00
a92668ae78 Merge pull request #859 from gaul/upload-remove-batching
Upload S3 parts without batching
2018-11-18 22:27:20 +09:00
88cd8feb05 Upload S3 parts without batching
Previously s3fs would issue a batch of uploads and wait for all to
succeed before issuing the next batch.  Now it issues the first batch
and only waits for a single part to succeed before uploading the next
part.  This can improve performance when one part lags due to network
errors.  Fixes #183.
2018-11-16 18:32:38 -08:00
91c16f826a Merge pull request #855 from gaul/readme/stackoverflow
Include StackOverflow in FAQs
2018-11-14 22:32:10 +09:00
d4d60ff315 Include StackOverflow in FAQs 2018-11-13 22:19:17 -08:00
e8033f96de Merge pull request #853 from gaul/readme-tilde
Replace ~ with ${HOME} in examples
2018-11-11 11:47:44 +09:00
5fba542a29 Merge pull request #852 from gaul/aws-credentials-file
Allow credentials from ${HOME}/.aws/credentials
2018-11-11 11:37:38 +09:00
44de3ffa05 Merge pull request #851 from gaul/list-object-max-keys
Correctly compare list_object_max_keys
2018-11-11 11:26:31 +09:00
2efa6df028 Merge pull request #849 from gaul/readme
Correct typo
2018-11-11 11:17:05 +09:00
9e530c86ae Allow credentials from ${HOME}/.aws/credentials
This matches the configuration from popular tools like AWS CLI and
allows multiple profile names via -o profile=name.  The existing
credential mechanisms continue to work.  Fixes #822.
2018-11-04 17:47:07 -08:00
95857733a1 Replace ~ with ${HOME} in examples
Several of these do not work since the shell does not replace ~ in the
middle of a token, e.g., -o passwd=~/.passwd .  Replace all of them
for consistency.  Fixes #836.
2018-11-04 17:45:16 -08:00
664f910083 Correctly compare list_object_max_keys
Previously this did not allow an argument.  Fixes #843.
References #793.
2018-11-04 10:49:35 -08:00
735e4b0848 Correct typo 2018-10-29 21:42:48 -07:00
e8d76a6f58 Merge pull request #840 from juliogonzalez/macOS
Replace all mentions to MacOS X to macOS
2018-10-28 20:33:51 +09:00
0a6926be54 Merge pull request #835 from juliogonzalez/generic-compilation
Make the compilation instructions generic
2018-10-28 20:00:21 +09:00
830a971bde Replace all mentions to MacOS X to macOS 2018-10-14 23:23:19 +02:00
4779d14d7d Make the compilation instructions generic 2018-10-08 22:27:01 +02:00
8929a27a24 Merge pull request #834 from juliogonzalez/issue-improvements
Improve template for issues
2018-10-09 00:37:20 +09:00
eea624c171 Merge pull request #833 from juliogonzalez/doc
New installation instructions for Fedora >= 27 and CentOS7
2018-10-09 00:05:36 +09:00
cdaf4a9674 Merge branch 'master' into doc 2018-10-08 23:56:20 +09:00
6fe92d5ed6 Merge pull request #832 from gaul/hex
Simplify hex conversion
2018-10-08 23:03:42 +09:00
8649a68766 Merge pull request #831 from JoohnSF/onezone_ia_support
Add support for storage class ONEZONE_IA.
2018-10-08 22:57:12 +09:00
af005b6e5e Merge pull request #826 from juliogonzalez/centos-setup
For RPM distributions fuse-libs is enough
2018-10-08 22:50:29 +09:00
b19d2ae78f Improve template for issues 2018-10-07 01:20:10 +02:00
5634f9bdcd New installation instructions for Fedora >= 27 and CentOS7 2018-10-07 00:52:45 +02:00
c703fa15c0 Simplify hex conversion
Addresses GCC 8 warning:

common_auth.cpp: In function ‘std::__cxx11::string s3fs_sha256sum(int, off_t, ssize_t)’:
common_auth.cpp:84:12: warning: ‘char* strncat(char*, const char*, size_t)’ output may be truncated copying 2 bytes from a string of length 2 [-Wstringop-truncation]
    strncat(sha256, hexbuf, 2);
2018-10-01 19:08:27 -07:00
d9c106cfde Add support for storage class ONEZONE_IA. 2018-09-30 14:27:31 +02:00
203f78fdae For RPM distributions fuse-libs is enough 2018-09-23 19:35:17 +02:00
c5af62b023 Merge pull request #820 from gaul/big-writes
Enable big writes if capable
2018-09-17 17:24:06 +09:00
dcd70daf48 Merge pull request #819 from soulprovidr/master
#691: Made instructions for creating password file more obvious.
2018-09-17 17:01:53 +09:00
8263919b0e Merge pull request #812 from mapreri/typo
Fix typo s/mutliple/multiple/
2018-09-17 16:52:48 +09:00
97488e603f Merge pull request #804 from DreamFlasher/patch-2
add Backblaze B2
2018-09-17 16:43:55 +09:00
41c23adb0e [curl] Assume long encryption keys are base64 encoded
Amazon SSE-C https://tinyurl.com/ychug4cg writes:

> Use this header to provide the 256-bit, base64-encoded encryption key
> for Amazon S3 to use to encrypt or decrypt your data.

It seems likely that future keys would be as long, or longer, so
this change assumes that text longer than 32 characters are keys
that are base64 encoded.

Signed-off-by: Earl Chew <earl_chew@yahoo.com>
2018-09-16 21:23:22 +00:00
a85183d42c Enable big writes if capable
Fixes #813.
2018-09-10 22:21:51 -07:00
45b67b9604 #691: Made instructions for creating password file more obvious. 2018-09-09 23:11:12 -05:00