Enter the query into the form above. You can look for specific version of a package by using @ symbol like this: gcc@10.
API method:
GET /api/packages?search=hello&page=1&limit=20
where search is your query, page is a page number and limit is a number of items on a single page. Pagination information (such as a number of pages and etc) is returned
in response headers.
If you'd like to join our channel webring send a patch to ~whereiseveryone/toys@lists.sr.ht adding your channel as an entry in channels.scm.
Ksoloti is an environment for generating and processing digital audio. It can be a programmable virtual modular synthesizer, polysynth, drone box, sequencer, chord generator, multi effect, sample player, looper, granular sampler, MIDI generator/processor, CV or trigger generator, anything in between, and more.
The Ksoloti Core is a rework of the discontinued Axoloti Core board. In short, Ksoloti aims for maximum compatibility with the original Axoloti, but with some layout changes and added features.
This package provides the patcher application.
The Axoloti patcher offers a “patcher” environment similar to Pure Data for sketching digital audio algorithms. The patches run on a standalone powerful microcontroller board: Axoloti Core. This package provides the patcher application.
Ksoloti is an environment for generating and processing digital audio. It can be a programmable virtual modular synthesizer, polysynth, drone box, sequencer, chord generator, multi effect, sample player, looper, granular sampler, MIDI generator/processor, CV or trigger generator, anything in between, and more.
The Ksoloti Core is a rework of the discontinued Axoloti Core board. In short, Ksoloti aims for maximum compatibility with the original Axoloti, but with some layout changes and added features.
This package provides the patcher application.
rsnapshot is a file system snapshot utility based on rsync. rsnapshot makes it easy to make periodic snapshots of local machines, and remote machines over SSH. To reduce the disk space required for each backup, rsnapshot uses hard links to deduplicate identical files.
Dump examines files in a file system, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. Subsequent incremental backups can then be layered on top of the full backup. The restore command performs the inverse function of dump; it can restore a full backup of a file system. Single files and directory subtrees may also be restored from full or partial backups in interactive mode.
Btar is a tar-compatible archiver which allows arbitrary compression and ciphering, redundancy, differential backup, indexed extraction, multicore compression, input and output serialisation, and tolerance to partial archive errors.
Burp is a network backup and restore program. It attempts to reduce network traffic and the amount of space that is used by each backup.
borgmatic is simple, configuration-driven backup software for servers and workstations. Protect your files with client-side encryption. Backup your databases too. Monitor it all with integrated third-party services. borgmatic is powered by borg.
Rdiff-backup backs up one directory to another, possibly over a network. The target directory ends up a copy of the source directory, but extra reverse diffs are stored in a special subdirectory of that target directory, so you can still recover files lost some time ago. The idea is to combine the best features of a mirror and an incremental backup. Rdiff-backup also preserves subdirectories, hard links, dev files, permissions, uid/gid ownership, modification times, extended attributes, acls, and resource forks. Also, rdiff-backup can operate in a bandwidth efficient manner over a pipe, like rsync. Thus you can use rdiff-backup and ssh to securely back a hard drive up to a remote location, and only the differences will be transmitted. Finally, rdiff-backup is easy to use and settings have sensible defaults.
The Restic REST server is a high performance HTTP server that implements restic's REST backend API. It provides a secure and efficient way to backup data remotely, using the restic backup client and a rest: URL.
wimlib is a C library and set of command-line utilities for creating, modifying, extracting, and mounting archives in the Windows Imaging Format (WIM files). It can capture and apply WIMs directly from and to NTFS volumes using ntfs-3g, preserving NTFS-specific attributes.
Duplicity backs up directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.
Rdup is a utility inspired by rsync and the plan9 way of doing backups. Rdup itself does not backup anything, it only print a list of absolute file names to standard output. Auxiliary scripts are needed that act on this list and implement the backup strategy.
Libarchive provides a flexible interface for reading and writing archives in various formats such as tar and cpio. Libarchive also supports reading and writing archives compressed using various compression filters such as gzip and bzip2. The library is inherently stream-oriented; readers serially iterate through the archive, writers serially add things to the archive. In particular, note that there is currently no built-in support for random access nor for in-place modification. This package provides the bsdcat, bsdcpio and bsdtar commands.
Btrbk is a backup tool for Btrfs subvolumes, taking advantage of Btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. The source and target locations are specified in a config file, which allows easily configuring simple scenarios like e.g. a laptop with locally attached backup disks, as well as more complex ones, e.g. a server receiving backups from several hosts via SSH, with different retention policy. It has features such as:
atomic snapshots
incremental backups
flexible retention policy
backups to multiple destinations
transfer via SSH
resume backups (for removable and mobile devices)
archive to offline storage
encrypted backups to non-btrfs storage
wildcard subvolumes (useful for Docker and LXC containers)
transaction log
comprehensive list and statistics output
resolve and trace Btrfs parent-child and received-from relationships
list file changes between backups
calculate accurate disk space usage based on block regions.
Btrbk is designed to run as a cron job for triggering periodic snapshots and backups, as well as from the command line (e.g. for instantly creating additional snapshots).
Borg is a deduplicating backup program. Optionally, it supports compression and authenticated encryption. The main goal of Borg is to provide an efficient and secure way to backup data. The data deduplication technique used makes Borg suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for storing backups on untrusted computers.
SnapRAID backs up files stored across multiple storage devices, such as disk arrays, in an efficient way reminiscent of its namesake RAID level 4.
Instead of creating a complete copy of the data like classic backups do, it saves space by calculating one or more sets of parity information that's a fraction of the size. Each parity set is stored on an additional device the size of the largest single storage volume, and protects against the loss of any one device, up to a total of six. If more devices fail than there are parity sets, (only) the files they contained are lost, not the entire array. Data corruption by unreliable devices can also be detected and repaired.
SnapRAID is distinct from actual RAID in that it operates on files and creates distinct snapshots only when run. It mainly targets large collections of big files that rarely change, like home media centers. One disadvantage is that all data not in the latest snapshot may be lost if one device fails. An advantage is that accidentally deleted files can be recovered, which is not the case with RAID.
It's also more flexible than true RAID: devices can have different sizes and more can be added without disturbing others. Devices that are not in use can remain fully idle, saving power and producing less noise.
Restic is a program that does backups right and was designed with the following principles in mind:
Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated.
Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast.
Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored.
Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers.
Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
ZBackup is a globally-deduplicating backup tool, based on the ideas found in Rsync. Feed a large .tar into it, and it will store duplicate regions of it only once, then compress and optionally encrypt the result. Feed another .tar file, and it will also re-use any data found in any previous backups. This way only new changes are stored, and as long as the files are not very different, the amount of storage required is very low. Any of the backup files stored previously can be read back in full at any time. The program is format-agnostic, so you can feed virtually any files to it.
Hdup2 is a backup utility, its aim is to make backup really simple. The backup scheduling is done by means of a cron job. It supports an include/exclude mechanism, remote backups, encrypted backups and split backups (called chunks) to allow easy burning to CD/DVD.
With dirvish you can maintain a set of complete images of your file systems with unattended creation and expiration. A dirvish backup vault is like a time machine for your data.
Vorta is a graphical backup client based on the Borg backup tool. It supports the use of remote backup repositories. It can perform scheduled backups, and has a graphical tool for browsing and extracting the Borg archives.
Disarchive can disassemble software archives into data and metadata. The goal is to create a small amount of metadata that can be used to recreate a software archive bit-for-bit from the original files. For example, a software archive made using tar and Gzip will need to describe the order of files in the tarball and the compression parameters used by Gzip.
Grsync is a simple graphical interface using GTK for the rsync command line program. It currently supports only a limited set of the most important rsync features, but can be used effectively for local directory synchronization.