Compare commits

...

8 Commits

Author SHA1 Message Date
gilbertchen
38a778557b Update GUIDE.md 2016-03-11 23:11:34 -05:00
gilbertchen
a08e54d6d3 Update README.md 2016-03-08 21:09:51 -05:00
gilbertchen
de3e2b9823 Update GUIDE.md 2016-03-07 16:14:53 -05:00
gilbertchen
b44dfc3ba5 Update GUIDE.md 2016-03-07 16:13:52 -05:00
gilbertchen
09ebcf79d2 Update README.md 2016-03-03 22:06:02 -05:00
gilbertchen
a93faa84b1 Update README.md 2016-03-03 22:04:52 -05:00
gilbertchen
b51d979bec Update README.md 2016-03-02 13:26:55 -05:00
gilbertchen
c2cc41d47c Update README.md 2016-03-02 13:09:27 -05:00
2 changed files with 24 additions and 20 deletions

View File

@@ -463,14 +463,14 @@ Duplicacy will attempt to retrieve in three ways the storage password and the st
| password type | environment variable (default storage) | environment variable (non-default storage) | key in preferences | | password type | environment variable (default storage) | environment variable (non-default storage) | key in preferences |
|:----------------:|:----------------:|:----------------:|:----------------:| |:----------------:|:----------------:|:----------------:|:----------------:|
| storage password | DUPLICACY_PASSWORD | DUPLICACY_<STORAGENAME>_PASSWORD | password | | storage password | DUPLICACY_PASSWORD | DUPLICACY_&lt;STORAGENAME&gt;_PASSWORD | password |
| sftp password | DUPLICACY_SSH_PASSWORD | DUPLICACY_<STORAGENAME>_SSH_PASSWORD | ssh_password | | sftp password | DUPLICACY_SSH_PASSWORD | DUPLICACY_&lt;STORAGENAME&gt;_SSH_PASSWORD | ssh_password |
| Dropbox Token | DUPLICACY_DROPBOX_TOKEN | DUPLICACY_<STORAGENAME>_DROPBOX_TOEKN | dropbox_token | | Dropbox Token | DUPLICACY_DROPBOX_TOKEN | DUPLICACY_&lt;STORAGENAME>&gt;_DROPBOX_TOKEN | dropbox_token |
| S3 Access ID | DUPLICACY_S3_ID | DUPLICACY_<STORAGENAME>_S3_ID | s3_id | | S3 Access ID | DUPLICACY_S3_ID | DUPLICACY_&lt;STORAGENAME&gt;_S3_ID | s3_id |
| S3 Secret Key | DUPLICACY_S3_KEY | DUPLICACY_<STORAGENAME>_S3_KEY | s3_key | | S3 Secret Key | DUPLICACY_S3_SECRET | DUPLICACY_&lt;STORAGENAME&gt;_S3_SECRET | s3_secret |
| BackBlaze Account ID | DUPLICACY_B2_ID | DUPLICACY_<STORAGENAME>_B2_ID | b2_id | | BackBlaze Account ID | DUPLICACY_B2_ID | DUPLICACY_&lt;STORAGENAME&gt;_B2_ID | b2_id |
| Backblaze Application Key | DUPLICACY_B2_KEY | DUPLICACY_<STORAGENAME>_B2_KEY | b2_key | | Backblaze Application Key | DUPLICACY_B2_KEY | DUPLICACY_&lt;STORAGENAME&gt;_B2_KEY | b2_key |
| Azure Access Key | DUPLICACY_AZURE_KEY | DUPLICACY_<STORAGENAME>_AZURE_KEY | azure_key | | Azure Access Key | DUPLICACY_AZURE_KEY | DUPLICACY_&lt;STORAGENAME&gt;_AZURE_KEY | azure_key |
Note that the passwords stored in the environment variable and the preference need to be in plaintext and thus are insecure and should be avoided whenever possible. Note that the passwords stored in the environment variable and the preference need to be in plaintext and thus are insecure and should be avoided whenever possible.

View File

@@ -7,11 +7,12 @@ This repository contains only binary releases and documentation for Duplicacy.
Duplicacy supports major cloud storage providers (Amazon S3, Google Cloud Storage, Microsoft Azure, Dropbox, and BackBlaze) and offers all essential features of a modern backup tool: Duplicacy supports major cloud storage providers (Amazon S3, Google Cloud Storage, Microsoft Azure, Dropbox, and BackBlaze) and offers all essential features of a modern backup tool:
* Incremental backup: only back up what has been changed * Incremental backup: only back up what has been changed
* Full snapshot : although each backup is incremental, it behaves like a full snapshot * Full snapshot : although each backup is incremental, it must behave like a full snapshot for easy restore and deletion
* Deduplication: identical files must be stored as one copy (file-level deduplication), and identical parts from different files must be stored as one copy (block-level deduplication) * Deduplication: identical files must be stored as one copy (file-level deduplication), and identical parts from different files must be stored as one copy (block-level deduplication)
* Encryption: encrypt not only file contents but also file paths, sizes, times, etc. * Encryption: encrypt not only file contents but also file paths, sizes, times, etc.
* Deletion: every backup can be deleted independently without affecting others * Deletion: every backup can be deleted independently without affecting others
* Concurrent access: multiple clients can back up to the same storage at the same time * Concurrent access: multiple clients can back up to the same storage at the same time
* Snapshot migration: all or selected snapshots can be migrated from one storage to another
The key idea behind Duplicacy is a concept called **Lock-Free Deduplication**, which can be summarized as follows: The key idea behind Duplicacy is a concept called **Lock-Free Deduplication**, which can be summarized as follows:
@@ -90,7 +91,7 @@ $ duplicacy copy -r 1 -to s3 # Copy snapshot at revision 1 to the s3 storage
$ duplicacy copy -to s3 # Copy every snapshot to the s3 storage $ duplicacy copy -to s3 # Copy every snapshot to the s3 storage
``` ```
The [User Guide](https://github.com/gilbertchen/duplicacy-beta/blob/master/DESIGN.md) contains a complete reference to The [User Guide](https://github.com/gilbertchen/duplicacy-beta/blob/master/GUIDE.md) contains a complete reference to
all commands and other features of Duplicacy. all commands and other features of Duplicacy.
## Storages ## Storages
@@ -110,7 +111,7 @@ Storage URL: /path/to/storage (on Linux or Mac OS X)
Storage URL: sftp://username@server/path/to/storage Storage URL: sftp://username@server/path/to/storage
``` ```
Login methods include password authentication and public key authentication. Due to a limitation of the underlying Go SSH library, the key pair for public key authentication be generated without a passphrase. To work with a key that has a passphrase, you can set up SSH agent forwarding which is also supported by Duplicacy. Login methods include password authentication and public key authentication. Due to a limitation of the underlying Go SSH library, the key pair for public key authentication must be generated without a passphrase. To work with a key that has a passphrase, you can set up SSH agent forwarding which is also supported by Duplicacy.
#### Dropbox #### Dropbox
@@ -124,7 +125,7 @@ For Duplicacy to access your Dropbox storage, you must provide an access token t
* Or authorize Duplicacy to access its app folder inside your Dropbox (following [this link](https://dl.dropboxusercontent.com/u/95866350/start_dropbox_token.html)), and Dropbox will generate the access token (which is not visible to us, as the redirect page showing the token is merely a static html hosted by Dropbox) * Or authorize Duplicacy to access its app folder inside your Dropbox (following [this link](https://dl.dropboxusercontent.com/u/95866350/start_dropbox_token.html)), and Dropbox will generate the access token (which is not visible to us, as the redirect page showing the token is merely a static html hosted by Dropbox)
Dropbox has two advantages over other cloud providers. First, if you are already a paid user then to use the unused space as the backup storage is basically free. Second, unlike other providers Dropbox does not charge API usage fees. Dropbox has two advantages over other cloud providers. First, if you are already a paid user then to use the unused space as the backup storage is basically free. Second, unlike other providers Dropbox does not charge bandwidth or API usage fees.
#### Amazon S3 #### Amazon S3
@@ -185,12 +186,15 @@ A command to delete old backups is in the developer's [plan](https://github.com/
The following table compares the feature lists of all these backup tools: The following table compares the feature lists of all these backup tools:
| Tool | Incremental Backup | Full Snapshot | Deduplication | Encryption | Deletion | Concurrent Access |Cloud Support |
|:----:|:----:|:----:|:----:|:----:|:----:|:----:|:----:| | Feature/Tool | duplicity | bup | Obnam | Attic | restic | **Duplicacy** |
| duplicity | Yes | No | Weak | Yes | No | No | Extensive | |:------------------:|:---------:|:---:|:-----------------:|:---------------:|:-----------------:|:-------------:|
| bup | Yes | Yes | Yes | Yes | No | No | No | | Incremental Backup | Yes | Yes | Yes | Yes | Yes | **Yes** |
| Obnam | Yes | Yes | Weak | Yes | Yes | Exclusive locking | No | | Full Snapshot | No | Yes | Yes | Yes | Yes | **Yes** |
| Attic | Yes | Yes | Yes | Yes | Yes | Not recommended | No | | Deduplication | Weak | Yes | Weak | Yes | Yes | **Yes** |
| restic | Yes | Yes | Yes | Yes | No | Exclusive locking | S3 only | | Encryption | Yes | Yes | Yes | Yes | Yes | **Yes** |
| **Duplicacy** | **Yes** | **Yes** | **Yes** | **Yes** | **Yes** | **Lock-free** | **S3, GCS, Azure, Dropbox, BackBlaze** | | Deletion | No | No | Yes | Yes | No | **Yes** |
| Concurrent Access | No | No | Exclusive locking | Not recommended | Exclusive locking | **Lock-free** |
| Cloud Support | Extensive | No | No | No | S3 only | **S3, GCS, Azure, Dropbox, BackBlaze**|
| Snapshot Migration | No | No | No | No | No | **Yes** |