restic 0.12.1-2 source package in Ubuntu

Changelog

restic (0.12.1-2) unstable; urgency=medium

  * dgit push-source failed with previous version, new try

 -- FĂ©lix Sipma <email address hidden>  Sun, 05 Sep 2021 12:03:00 +0200

Upload details

Uploaded by:
Debian Go Packaging Team
Uploaded to:
Sid
Original maintainer:
Debian Go Packaging Team
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Jammy release universe misc

Downloads

File Size SHA-256 Checksum
restic_0.12.1-2.dsc 2.6 KiB 7170001d6f317e527e9c1ab13caac625a97d58d0983ee94d6ee4bbac0cf9cf58
restic_0.12.1.orig.tar.gz 22.7 MiB a9c88d5288ce04a6cc78afcda7590d3124966dab3daa9908de9b3e492e2925fb
restic_0.12.1.orig.tar.gz.asc 833 bytes c5c008cdfa916e74c59efc04fd95be48b6118ea552b84307bca25be8c4143cc7
restic_0.12.1-2.debian.tar.xz 11.5 KiB f7eb05623b76695bcb0a933f3624da31dd1e0791b11166048486628de7384480

Available diffs

No changes file available.

Binary packages built by this source

restic: backup program with multiple revisions, encryption and more

 restic is a program that does backups right and was designed with the following
 principles in mind:
    - Easy: Doing backups should be a frictionless process, otherwise you might
 be tempted to skip it. Restic should be easy to configure and use, so
 that, in the event of a data loss, you can just restore it. Likewise,
 restoring data should not be complicated.
    - Fast: Backing up your data with restic should only be limited by your
 network or hard disk bandwidth so that you can backup your files every day.
 Nobody does backups if it takes too much time. Restoring backups should
 only transfer data that is needed for the files that are to be restored, so
 that this process is also fast.
    - Verifiable: Much more important than backup is restore, so restic enables
 you to easily verify that all data can be restored.
    - Secure: Restic uses cryptography to guarantee confidentiality and
 integrity of your data. The location the backup data is stored is assumed
 not to be a trusted environment (e.g. a shared space where others like
 system administrators are able to access your backups). Restic is
 built to secure your data against such attackers.
    - Efficient: With the growth of data, additional snapshots should only take
 the storage of the actual increment. Even more, duplicate data should be
 de-duplicated before it is actually written to the storage back end to save
 precious backup space.

restic-dbgsym: debug symbols for restic