You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add mitigation for weird NtQuerySecurityObject behavior on NAS sources (#1872)
* Add check for 0 length, attempt to validate the returned object.
* Change to grabbing real SD length
* Add comment describing issue
* Prevent infinite loop upon listing failure
* Fix GCP error checking
* Fix GCP disable
* Fix bad URL delete (#1892)
* Manipulate URLs safely
* Fix folder deletion test
* Prevent infinite loop upon listing failure
* Fix GCP error checking
* Fix GCP disable
* Fail when errors listing/clearing bucket
* Update MacOS testing pipeline (#1896)
* fixing small typo (,) in help of jobs clean (#1899)
* Microsoft mandatory file
* fixing small typo (,) in help of jobs clean
Co-authored-by: microsoft-github-policy-service[bot] <77245923+microsoft-github-policy-service[bot]@users.noreply.github.com>
Co-authored-by: Mohit Sharma <65536214+mohsha-msft@users.noreply.github.com>
* Implement MD OAuth testing (#1859)
* Implement MD OAuth testing
* Handle async on RevokeAccess, handle job cancel/failure better
* Prevent parallel testing of managed disks
* lint check
* Prevent infinite loop upon listing failure
* Fix GCP error checking
* Fix GCP disable
* Fail when errors listing/clearing bucket
* Add env vars
* Avoid revoking MD access, as it can be shared.
* Fix intermittent failures
* Disable MD OAuth testing temporarily.
* Add "all" to documentation (#1902)
* 10.16.1 patch notes (#1913)
* Add bugfixes to change log.
* Correct wording & punctuation
* Correct version
* Export Successfully Updated bytes (#1884)
* Add info in error message for mkdir on Log/Plan (#1883)
* Microsoft mandatory file
* Add info in error message for mkdir on Log/Plan
Co-authored-by: microsoft-github-policy-service[bot] <77245923+microsoft-github-policy-service[bot]@users.noreply.github.com>
Co-authored-by: Mohit Sharma <65536214+mohsha-msft@users.noreply.github.com>
* Fix fixupTokenJson (#1890)
* Microsoft mandatory file
* Fix fixupTokenJson
Co-authored-by: microsoft-github-policy-service[bot] <77245923+microsoft-github-policy-service[bot]@users.noreply.github.com>
Co-authored-by: Mohit Sharma <65536214+mohsha-msft@users.noreply.github.com>
Co-authored-by: Adam Orosz <adam.orosz@neotechnology.com>
* Do not log request/response for container creation error (#1893)
* Expose AZCOPY_DOWNLOAD_TO_TEMP_PATH environment variable. (#1895)
* Slice against the correct string (#1927)
* UX improvement: avoid crash when copying S2S with user delegation SAS (#1932)
* Fix bad build + Prevent bad builds in the future (#1917)
* Fix bad build + Prevent bad builds in the future
* Add Windows build
* Make sync use last write time for Azure Files (#1930)
* Make sync use last write time for Azure Files
* Implement test
* 10.16.2 Changelog (#1948)
* Update azcopy version
* Fixed a bug where preserve permissions would not work with OAuth
* Added CODEOWNERS file
* Fixed issue where CPK would not be injected on retries
* remove OAuth from test
* Updated version check string to indicate current AzCopy version (#1969)
* added codeowner
* Enhance job summary with details about file/folders (#1952)
* Add flag to disable version check (#1950)
* darwin arm64
* Update golang version to 10.19.2 (#1925)
* enable cgo
* added tests
* Minor fixes: More in description (#1968)
* Echo auto-login failure if any
* Update help for sync command to use trailing slash on directories
* azcopy fail to copy 12TB file to Storage containers in Dev.
The logic is used to calculate proper blockSize if it’s not provided, and due to the uint32 cast, it can’t give proper blockSize if filesize is between 50000 * (8 * 1024 * 1024) * X + 1, to 50000 * (8 * 1024 * 1024) * X + 49999. It should return 16MB instead of 8MB blockSize.
Accommodated the changes suggested by Narasimha Kulkarni
* Added extra logging when switching endpoints
* Enable support for preserving SMB info on Linux. (#1723)
* Microsoft mandatory file
* Enable support for preserving SMB info on Linux.
Implemented the GetSDDL/PutSDDL GetSMBProperties/PutSMBProperties
methods for Linux using extended attributes.
Following are the xattrs we use for fetching/setting various required
info.
// Extended Attribute (xattr) keys for fetching various information from Linux cifs client.
const (
CIFS_XATTR_CREATETIME = "user.cifs.creationtime" // File creation time.
CIFS_XATTR_ATTRIB = "user.cifs.dosattrib" // FileAttributes.
CIFS_XATTR_CIFS_ACL = "system.cifs_acl" // DACL only.
CIFS_XATTR_CIFS_NTSD = "system.cifs_ntsd" // Owner, Group, DACL.
CIFS_XATTR_CIFS_NTSD_FULL = "system.cifs_ntsd_full" // Owner, Group, DACL, SACL.
)
Majority of the changes are in sddl/sddlHelper_linux.go which implement
the following Win32 APIs for dealing with SIDs.
ConvertSecurityDescriptorToStringSecurityDescriptorW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
ConvertStringSidToSidW
Note: I have skipped Object ACE support in sddl/sddlHelper_linux.go as
those should not be used for filesystem properties, only AD object
properties.
Can someone confirm this?
TBD:
Conditional SID
* Audited, fixed, tested support for "No ACL"/NO_ACCESS_CONTROL and ACL w/o any ACE
Tested the following cases:
c:\Users\natomar\Downloads>cd testacl
// This has "No ACLs" and everyone should be allowed access.
c:\Users\natomar\Downloads\testacl>touch NO_ACCESS_CONTROL.txt
c:\Users\natomar\Downloads\testacl>cacls NO_ACCESS_CONTROL.txt /S:D:NO_ACCESS_CONTROL
Are you sure (Y/N)?y
processed file: c:\Users\natomar\Downloads\testacl\NO_ACCESS_CONTROL.txt
// This has "No ACLs" and everyone should be allowed access.
// It additionally has the "P" (protected) flag set, but that won't have
// any effect as that just prevents ACE inheritance but this ACL will
// not have any ACLs due to the NO_ACCESS_CONTROL flag.
c:\Users\natomar\Downloads\testacl>touch PNO_ACCESS_CONTROL.txt
c:\Users\natomar\Downloads\testacl>cacls PNO_ACCESS_CONTROL.txt /S:D:PNO_ACCESS_CONTROL
Are you sure (Y/N)?y
processed file: c:\Users\natomar\Downloads\testacl\PNO_ACCESS_CONTROL.txt
// This should set DACL but with no ACEs, but since "P" is not set it
// inherits ACEs from the parent dir.
c:\Users\natomar\Downloads\testacl>touch empty_d.txt
c:\Users\natomar\Downloads\testacl>cacls empty_d.txt /S:D:
Are you sure (Y/N)?y
processed file: c:\Users\natomar\Downloads\testacl\empty_d.txt
// This should set DACL but with no ACEs, but since "P" is set it
// doesn't inherit ACEs from the parent dir and hence this will block
// all users.
c:\Users\natomar\Downloads\testacl>touch empty_d_with_p.txt
c:\Users\natomar\Downloads\testacl>cacls empty_d_with_p.txt /S:D:P
Are you sure (Y/N)?y
processed file: c:\Users\natomar\Downloads\testacl\empty_d_with_p.txt
* Don't fail outright for ACL revision 4.
Though our supported ACL types must carry ACL revision 2 as per the doc
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dtyp/20233ed8-a6c6-4097-aafa-dd545ed24428
but I've seen some dirs have ACL revision 4 but ACL types are still
supported ones. So instead of failing upfront, let it fail with
unsupported ACE type.
Also hexadecimal aceRights are more commonly seen than I expected, so
removing a log.
* Minor fix after running azcopy on a large dir.
This was something which I have doubt on. Now that we got a real world
issue due to this, it's all clear :-)
* Some minor updates after the rebase to latest Azcopy.
* Set default value of flag preserve-smb-info to true on Windows and false on other OS
(cherry picked from commit ac5bedb)
Co-authored-by: microsoft-github-policy-service[bot] <77245923+microsoft-github-policy-service[bot]@users.noreply.github.com>
Co-authored-by: Nagendra Tomar <Nagendra.Tomar@microsoft.com>
* Added log indicating a sub-directory is being enqueued (#1999)
* Log sync deletions to scanning logger (#2000)
* ieproxy fix
* remove cgo
* fix
* fix
* fix
* more testing
* more testing
* more testing
* more testing
* mod tidy
* mod tidy
* more testing
* Added codespell (#2008)
* Added codespell
* Fixed initial codespell errors
* Fix format in codespell.yml
* Added s3 url parts
* Added CodeQL (#2009)
* Added linting file
* Upgrade codeql to v2
* Fix incorrect conversion between integer types
* Fix GCP URL parts
* Fix for rare infinite loop on mutex acquisition (#2012)
* small fix
* removed test
* Added trivy file (#2015)
* Added trivy file
* renamed trivy
* Improve debug-ability of e2e tests by uploading logs of failed jobs (#1898)
* Upload testing logs to storage account on failed test
* Handle as pipeline artifact instead
* mkdirall
* copy plan files too
* Fix failing tests
* Change overwrite to affect any "locked in"/completed state
* Fail copy job if single blob does not exist (#1981)
* Job fail if single file does not exist
* fixed change
* fail only on a single file not existing
* fail on file not found
* fail on file not found
* fail on file not found
* cleanup
* added tests
* cleanup
* removed test
* Correct odd behavior around folder overwrites (#1961)
* Fix files sync by determining which LMT to use via smb properties flag (#1958)
* Fix files sync by determining which LMT to use via smb properties flag
* Implement testing for LMT switch
* Fix testing
* Limit SMB testing to SMB-compatible environment
* Enforce SMB LMT for Linux/MacOS test of SMB LMT preference
* Fix metadata parsing (#1953)
* Fix metadata parsing
* rework metadata parsing to be more robust; add test
* Fix comment lines
* Codespell :|
* Fix ADLSG2 intermittent failure (#1901)
* Fix ADLSG2 intermittent failure
* Add test
* Reduce code dupe
* Fix build errors
* Fix infinite loop maybe?
* Store source token and pass to other threads (#1996)
* Store source token
* testing
* failing pipe
* cleanup
* test logger
* fix test failure
* fix 2
* fix
* sync fix
* cleanup check
* Hash based sync (#2020)
* Implement hash based sync for MD5
* Implement testing
* Ensure folders are handled properly in HBS & Test S2S
* Add skip/process logging
* Include generic xattr syncmeta application
* Fix 0-size blobs
* Fix core testing
* Revert "Include generic xattr syncmeta application"
This reverts commit fba55e4.
* Warn on no hash @ source, remove MHP
* Comments
* Comments
* Copy properties from Source (#1964)
* Copy properties from Source
* Remove unnecessary ws changes
* Preserve UNIX properties
* Move entity type to Overwrite option
* Add python suite
* Review comments
* Fix test
* Release notes and version update (#2028)
Co-authored-by: adreed-msft <49764384+adreed-msft@users.noreply.github.com>
Co-authored-by: mstenz <mstenz-design@web.de>
Co-authored-by: microsoft-github-policy-service[bot] <77245923+microsoft-github-policy-service[bot]@users.noreply.github.com>
Co-authored-by: Mohit Sharma <65536214+mohsha-msft@users.noreply.github.com>
Co-authored-by: Adele Reed <adreed@microsoft.com>
Co-authored-by: Karla Saur <1703543+ksaur@users.noreply.github.com>
Co-authored-by: adam-orosz <106535811+adam-orosz@users.noreply.github.com>
Co-authored-by: Adam Orosz <adam.orosz@neotechnology.com>
Co-authored-by: Ze Qian Zhang <zezha@microsoft.com>
Co-authored-by: Gauri Prasad <gapra@microsoft.com>
Co-authored-by: Gauri Prasad <51212198+gapra-msft@users.noreply.github.com>
Co-authored-by: Tamer Sherif <tasherif@microsoft.com>
Co-authored-by: Tamer Sherif <69483382+tasherif-msft@users.noreply.github.com>
Co-authored-by: reshmav18 <73923840+reshmav18@users.noreply.github.com>
Co-authored-by: linuxsmiths <linuxsmiths@gmail.com>
Co-authored-by: Nagendra Tomar <Nagendra.Tomar@microsoft.com>
Copy file name to clipboardexpand all lines: ChangeLog.md
+22-9
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,19 @@
1
1
2
2
# Change Log
3
3
4
+
## Version 10.17.0
5
+
6
+
### New features
7
+
8
+
1. Added support for hash-based sync. AzCopy sync can now take two new flags `--compare-hash` and `--missing-hash-policy=Generate`, which which user will be able to transfer only those files which differ in their MD5 hash.
9
+
10
+
### Bug fixes
11
+
1. Fixed [issue 1994](https://github.com/Azure/azure-storage-azcopy/pull/1994): Error in calculation of block size
1. Fixed [issue 1506](https://github.com/Azure/azure-storage-azcopy/issues/1506): Added input watcher to resolve issue since job could not be resumed.
36
49
2. Fixed [issue 1794](https://github.com/Azure/azure-storage-azcopy/issues/1794): Moved log-level to root.go so log-level arguments do not get ignored.
37
50
3. Fixed [issue 1824](https://github.com/Azure/azure-storage-azcopy/issues/1824): Avoid creating .azcopy under HOME if plan/log location is specified elsewhere.
38
-
4. Fixed [isue 1830](https://github.com/Azure/azure-storage-azcopy/issues/1830), [issue 1412](https://github.com/Azure/azure-storage-azcopy/issues/1418), and [issue 873](https://github.com/Azure/azure-storage-azcopy/issues/873): Improved error message for when AzCopy cannot determine if source is directory.
51
+
4. Fixed [issue 1830](https://github.com/Azure/azure-storage-azcopy/issues/1830), [issue 1412](https://github.com/Azure/azure-storage-azcopy/issues/1418), and [issue 873](https://github.com/Azure/azure-storage-azcopy/issues/873): Improved error message for when AzCopy cannot determine if source is directory.
39
52
5. Fixed [issue 1777](https://github.com/Azure/azure-storage-azcopy/issues/1777): Fixed job list to handle respective output-type correctly.
40
53
6. Fixed win64 alignment issue.
41
54
@@ -191,7 +204,7 @@
191
204
192
205
### New features
193
206
1. Added option to [disable parallel blob listing](https://github.com/Azure/azure-storage-azcopy/pull/1263)
194
-
1. Added support for uploading [large files](https://github.com/Azure/azure-storage-azcopy/pull/1254/files)upto 4TiB. Please refer the [public documentation](https://docs.microsoft.com/en-us/rest/api/storageservices/create-file) for more information
207
+
1. Added support for uploading [large files](https://github.com/Azure/azure-storage-azcopy/pull/1254/files)up to 4TiB. Please refer the [public documentation](https://docs.microsoft.com/en-us/rest/api/storageservices/create-file) for more information
195
208
1. Added support for `include-before`flag. Refer [this](https://github.com/Azure/azure-storage-azcopy/issues/1075) for more information
196
209
197
210
### Bug fixes
@@ -469,7 +482,7 @@ disallowed because none (other than include-path) are respected.
469
482
470
483
1. The `*` character is no longer supported as a wildcard in URLs, except for the two exceptions
471
484
noted below. It remains supported in local file paths.
472
-
1. The first execption is that `/*` is still allowed at the very end of the "path" section of a
485
+
1. The first exception is that `/*` is still allowed at the very end of the "path" section of a
473
486
URL. This is illustrated by the difference between these two source URLs:
474
487
`https://account/container/virtual?SAS` and
475
488
`https://account/container/virtualDir/*?SAS`. The former copies the virtual directory
@@ -501,7 +514,7 @@ disallowed because none (other than include-path) are respected.
501
514
1. Percent complete is displayed as each job runs.
502
515
1. VHD files are auto-detected as page blobs.
503
516
1. A new benchmark mode allows quick and easy performance benchmarking of your network connection to
504
-
Blob Storage. Run AzCopy with the paramaters`bench --help` for details. This feature is in
517
+
Blob Storage. Run AzCopy with the parameters`bench --help` for details. This feature is in
505
518
Preview status.
506
519
1. The location for AzCopy's "plan" files can be specified with the environment variable
507
520
`AZCOPY_JOB_PLAN_LOCATION`. (If you move the plan files and also move the log files using the existing
@@ -520,7 +533,7 @@ disallowed because none (other than include-path) are respected.
520
533
1. Memory usage can be controlled by setting the new environment variable `AZCOPY_BUFFER_GB`.
521
534
Decimal values are supported. Actual usage will be the value specified, plus some overhead.
522
535
1. An extra integrity check has been added: the length of the
523
-
completed desination file is checked against that of the source.
536
+
completed destination file is checked against that of the source.
524
537
1. When downloading, AzCopy can automatically decompress blobs (or Azure Files) that have a
525
538
`Content-Encoding` of `gzip` or `deflate`. To enable this behaviour, supply the `--decompress`
526
539
parameter.
@@ -685,21 +698,21 @@ information, including those needed to set the new headers.
685
698
686
699
1. For creating MD5 hashes when uploading, version 10.x now has the OPPOSITE default to version
687
700
AzCopy 8.x. Specifically, as of version 10.0.9, MD5 hashes are NOT created by default. To create
688
-
Content-MD5 hashs when uploading, you must now specify `--put-md5` on the command line.
701
+
Content-MD5 hashes when uploading, you must now specify `--put-md5` on the command line.
689
702
690
703
### New features
691
704
692
705
1. Can migrate data directly from Amazon Web Services (AWS). In this high-performance data path
693
706
the data is read directly from AWS by the Azure Storage service. It does not need to pass through
694
-
the machine running AzCopy. The copy happens syncronously, so you can see its exact progress.
707
+
the machine running AzCopy. The copy happens synchronously, so you can see its exact progress.
695
708
1. Can migrate data directly from Azure Files or Azure Blobs (any blob type) to Azure Blobs (any
696
709
blob type). In this high-performance data path the data is read directly from the source by the
697
710
Azure Storage service. It does not need to pass through the machine running AzCopy. The copy
698
-
happens syncronously, so you can see its exact progress.
711
+
happens synchronously, so you can see its exact progress.
699
712
1. Sync command prompts with 4 options about deleting unneeded files from the target: Yes, No, All or
700
713
None. (Deletion only happens if the `--delete-destination` flag is specified).
701
714
1. Can download to /dev/null. This throws the data away - but is useful for testing raw network
702
-
performance unconstrained by disk; and also for validing MD5 hashes in bulk (when run in a cloud
715
+
performance unconstrained by disk; and also for validating MD5 hashes in bulk (when run in a cloud
0 commit comments