forked from TrueCloudLab/restic
1ccab95bc4
Automatically fall back to hiding files if not authorized to permanently delete files. This allows using restic with an append-only application key with B2. Thus, an attacker cannot directly delete backups with the API key used by restic. To use this feature create an application key without the deleteFiles capability. It is recommended to restrict the key to just one bucket. For example using the b2 command line tool: b2 create-key --bucket <bucketName> <keyName> listBuckets,readFiles,writeFiles,listFiles Suggested-by: Daniel Gröber <dxld@darkboxed.org> |
||
---|---|---|
.. | ||
0.6.0_2017-05-29 | ||
0.6.1_2017-06-01 | ||
0.7.0_2017-07-01 | ||
0.7.1_2017-07-22 | ||
0.7.2_2017-09-13 | ||
0.7.3_2017-09-20 | ||
0.8.0_2017-11-26 | ||
0.8.1_2017-12-27 | ||
0.8.2_2018-02-17 | ||
0.8.3_2018-02-26 | ||
0.9.0_2018-05-21 | ||
0.9.1_2018-06-10 | ||
0.9.2_2018-08-06 | ||
0.9.3_2018-10-13 | ||
0.9.4_2019-01-06 | ||
0.9.5_2019-04-23 | ||
0.9.6_2019-11-22 | ||
0.10.0_2020-09-19 | ||
0.11.0_2020-11-05 | ||
0.12.0_2021-02-14 | ||
0.12.1_2021-08-03 | ||
0.13.0_2022-03-26 | ||
0.14.0_2022-08-25 | ||
unreleased | ||
changelog-github.tmpl | ||
CHANGELOG.tmpl | ||
TEMPLATE |