-
Notifications
You must be signed in to change notification settings - Fork 246
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC: Investigate read-only mounting during "rear recover" #2887
Comments
The log gets written into the recovered system, not on the medium, AFAIK. (Writing to the medium would be USB-specific.) |
Also, one may even improve this by setting the device read-only at the block device level, i.e. by |
I think some log might be written to a mounted NFS share |
Stale issue message |
I'm also in favour of mounting all external media/file shares read-only. That is a good example for defensive programming and it can save some users from accidentially erasing their backups |
not sure if all backup tools would be happy with a I do not see a big plus in a Note: I hate being the conservative voice -.- |
@DEvil0000 I think the question was not about the "sacrosanct" meaning that we should mount those read-only to prevent potential coding or configuration errors from accidentally erasing the backups. |
I know that this is your reasoning - which is very valid. I however do not know all the backup backends possible with rear but I can think of one organizing the data in some kind of database and needing some sort of |
Stale issue message |
This issue is triggered by
#2886
therein in particular my comments (excerpts):
cf. #1271
So I would like to investigate if it is feasible
and possible to implement with reasonable effort
to mount things read-only during "rear recover"
when things are only needed to be read
e.g. to restore a backup.tar.gz.
I think during "rear recover" some things may need to be
written (e.g. a some log file or something like that)
which could make it rather complicated to mount things
read-only.
See also
WRITE_PROTECTED_IDS and WRITE_PROTECTED_FS_LABEL_PATTERNS
and the related issue
#1271
with its pull requests
#2626
and
#2703
The text was updated successfully, but these errors were encountered: