abarms


Nameabarms JSON
Version 1.1.1 PyPI version JSON
download
home_pageNone
SummaryA handy Swiss-army-knife-like utility for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools
upload_time2024-03-22 09:23:23
maintainerNone
docs_urlNone
authorNone
requires_python>=3.7
licenseGPL-3.0-or-later
keywords android android backup adb ab adb backup
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # What is `abarms`?

`abarms` is a *handy* Swiss-army-knife-like tool for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools.

`abarms` can

- list contents of Android Backup files,
- strip encryption and compression from Android Backup files (so that you could re-compress them with something better for long-term storage),
- convert Android Backup files into TAR files (which you can then unpack with standard `tar`),
- convert TAR files into Android Backup files (though, see the documentation for `abarms wrap` below explaining why you should be careful about doing that),
- split Android Backup files into smaller by-app backups (each of which you can then give to `adb restore` to restore that one app, or just file-level de-duplicate them between different backups),
- merge those back into full-system backups like those produced by `adb backup`,
- and other similar things.

Basically, this is a simpler pure Python implementation (only requires `setuptools` and `cryptography` modules) of [android-backup-extractor](https://github.com/nelenkov/android-backup-extractor) and the parts of [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) and [android-backup-processor](https://sourceforge.net/projects/android-backup-processor/) that I use myself.

`abarms` will run on Linux and all other POSIX-compatible operating systems Python supports.
The author also expects it will work fine on Windows, even though it was not tested there (do report an Issue if it does not).

# <span id="why"/>Why does `abarms` exists?

Read the parts highlighted in bold in the following subsection.

## <span id="adb-backup"/>UNIX in 1970s had better system backup tools than current Android OS

**Did you know that your Android OS device already has an awesome built-in full-system phone-to-PC backup and PC-to-phone restore tool that does not require root access?**
`adb` utility of Android Platform Tools has `adb backup` subcommand that, in principle, can do basically everything you could possibly want there.

Internally this is implemented via Android OS setuid root binary named `bu` --- which you can run manually via `adb shell bu help` --- that simply backs up every app on the device one by one and streams the resulting `.ab` file --- which is a wrapped PAX-formatted TAR file (see "EXTENDED DESCRIPTION" section in [`man 1 pax`](https://man7.org/linux/man-pages/man1/pax.1p.html#EXTENDED_DESCRIPTION)) --- to stdout. `adb backup` subcommand is just a simple wrapper around it.

**But then Android Platform Tools bundle gives no tools to manipulate those backup files!
So, if you make a full-system backup with `adb backup`, and then want to restore a single app out of 100+ you have installed on your device, you need third-party tools now.**
This is kind of embarrassing, to be honest.
A tool to manipulate backup files should have been a standard utility in Android Platform Tools since Android version 0.1 or something.
(Seriously, are you not embarrassed? I'm embarrassed for the state of humanity thinking about how the most popular OS on the planet gives no widely accessible local backup and restore tools on par with what every user of 1970s-era UNIX mainframe had out of the box. I'm not asking for automatic opportunistic incremental quantum-safely encrypted full-system replication to cooperative nearby devices in a local mesh-network here!)

Well, technically speaking, Android OS also has automatic scheduled non-interactive backup service `bmgr` --- which can be controlled via Android settings menu and `adb shell bmgr help`, that does per-app backups and restores.
Internally, `bmgr` service also generates `.ab` files and then either uploads them to Google --- which is the default and the only option available through the settings menu --- or stores them locally under `/data/data/com.android.localtransport/files/` --- which requires root to access.
On old Android versions you could ask `bmgr` to do a backup to an SD card directly from the settings menu, but Google removed that functionality to force users to use Cloud-based backups.

So, basically, according to Google (and Samsung, which ship with their own `bmgr`-like service in parallel with `bmgr`), to restore to a previous state of an app, or to migrate between phones you now apparently have to upload all your data to their servers in plain-text for their convenient data-mining and selling of your data to interested third parties.
Google even went as far as to hide `adb backup` subcommand from their official Android documentation: compare the [old manual for `adb`](https://web.archive.org/web/20180426100826/https://developer.android.com/studio/command-line/adb) with the [current one](https://web.archive.org/web/20240129131223/https://developer.android.com/tools/adb), Control+F for "backup".

This resulted into every Android vendor now making their own vendor-specific phone-to-phone migration utilities, and a whole ecosystem of commercial apps that do what `adb backup` already does, but worse.

This also resulted in usefulness of `adb backup` itself being reduced because in Android version 6 Google made automatic daily file-based backups that get uploaded to Google the default when you attach your phone to your Google account.
So, most apps started to opt-out of those backups for privacy and security reasons -- which also started opting them out of being included in `adb backup` output, since `bmgr` and `bu` share most of the infrastructure.
Some of those apps now implement their own in-app backup buttons hidden away in the settings menu somewhere, but most do not.

Yes, this is stupid, see [this discussion on StackOverflow](https://stackoverflow.com/questions/12648373/what-is-androidallowbackup).
See also old Android developer docs that explained this fairly clearly [here](https://web.archive.org/web/20181122123338/https://developer.android.com/guide/topics/data/backup) and [here](https://web.archive.org/web/20181118184751/https://developer.android.com/guide/topics/data/testingbackup).

(You can also force an app to be included in `adb backup` by rebuilding its APK to enable `android:allowBackup` attribute in the manifest and installing the result manually, see [this](https://stackpointer.io/mobile/android-enable-adb-backup-for-any-app/462/) for more info.
But this will only work for newly installed apps as you will have to re-sign the resulting APK with your own private key and Android forbids app updates that change the signing key.)

But, hopefully, eventually, some alternative firmware developer will fix the above bug and allow `adb backup` to backup all apps regardless of `android:allowBackup` manifest setting, as it should.

Still, `adb backup` works fine for a lot of apps and, hopefully, will eventually get back to working as well as it did before Android version 6 in the future.
Meanwhile, [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) allows you to split full-system dumps produced by `adb backup` into per-app backups that can then be restored with `adb restore`.

The problem is that, while I'm thankful that [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) exists, I find it really annoying to use: it is a bundle of pre-compiled Java apps, binaries, and shell scripts that manages to work somehow, but modifying anything there is basically impossible as building all of those things from sources is an adventure I failed to complete, and then you need to install the gigantic Java VM and libraries to run it all.

**So, as it currently stands, to have per-app backups of your Android device you have to either:**

- **root your device;**
- **give up your privacy by uploading your backups to other people's computers (aka "the cloud"); or**
- **repack all you APKs with `android:allowBackup = true` and either run older Android firmware that can do backup to an SD card or run `adb backup` from your PC, and then extract per-app backups from its output with third-party tools like [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) (yes, this is not ideal, but it works, and does not need root).**

**So, one day I was looking at all of this.
I couldn't root or change the firmware on a phone I wanted to keep backed up, but I could follow the last option and get most of what I wanted with almost no effort.
Except figuring out how to run `android-backup-toolkit` to do the very last step of this took me quite a while.
And so I thought, "Hmm, this seems overly complicated, something as simple as splitting and merging TAR files with some additional headers should be doable with a simple Python program."
So I made one.**

It turned out to be a bit less simple than I though it would be, mostly because Python's `tarfile` module was not designed for this, so I had to make my own, and PAX-formatted TAR files are kind of ugly to parse, but it works now, so, eh.

**Hopefully, `abarms` existing will inspire more app and alternative firmware developers to support `adb backup` properly and so personal computing devices of late 2020s will finally reach feature parity with 1970s-era Tape ARchiving (TAR) backup technology.**
(You can backup any UNIX box to an external HDD with `tar -cvvf /media/external/backup.tar --one-file-system /`.
Yes, it will actually work.)

# Quickstart

## Installation

- Install with:
  ``` {.bash}
  pip install abarms
  ```
  and run as
  ``` {.bash}
  abarms --help
  ```
- Alternatively, install it via Nix
  ``` {.bash}
  nix-env -i -f ./default.nix
  abarms --help
  ```
- Alternatively, run without installing:
  ``` {.bash}
  alias abarms="python3 -m abarms"
  abarms --help
  ```

## Backup all apps from your Android device, then restore a single app, without root

### Prepare your PC and phone

Before you make a full backup of your Android phone (or other device) you need to

- install Android Platform Tools (either from [there](https://developer.android.com/tools/releases/platform-tools) or from you distribution);

- enable "Developer Mode" and turn on "USB Debugging" in "Developer Options" (see [Android Docs](https://web.archive.org/web/20240129131223/https://developer.android.com/tools/adb) for instructions);

- then, usually, on your PC you need to run

  ```
  sudo adb kill-server
  sudo adb start-server
  ```

  unless, you added special UDev rules for your phone.

Additionally, depending your device, you might also need to enable "Stay awake" in "Developer Options", otherwise long enough backups might get interrupted in the middle by your device going to sleep.
Personally, I find having it enabled kind of annoying, so I recommend trying to do everything below with it disabled first, and enable it only if your backups get truncated.

### Do a full backup

To do the backup, you need to

- unlock your phone and connect it to your PC via a USB cable (in that order, otherwise USB Debugging will be disabled),

- confirm that the PC is allowed to do USB Debugging in the popup on the phone, then

- run

  ```
  adb backup -apk -obb -all -system -keyvalue
  ```

  on your PC (see below if that does not work),

- unlock your phone again, and

- press "Back up my data" button at the bottom of your screen.

Now you need to wait awhile for `adb` to finish.
The result will be saved in `backup.ab` file.

If you want to backup to an explicitly named file, e.g. to note the date of the backup, run

```
adb backup -f backup_20240101.ab -apk -obb -all -system -keyvalue
```

If `adb backup` does not work, you can invoke `bu` via `adb shell` instead:

```
adb shell 'bu backup -apk -obb -all -system -keyvalue' > backup_20240101.ab
```

### Split it into pieces

You can view contents of the backup via

```
abarms ls backup_20240101.ab
```

and split it into per-app backups via

```
abarms split backup_20240101.ab
```

which will produce a bunch of files named `abarms_split_<filename>_<num>_<appname>.ab` (e.g. `abarms_split_backup_20240101_020_org.fdroid.fdroid.ab`).

### Restore a single app

A single per-app file can be fed back to `adb restore` to restore that singe app, e.g.

```
adb restore abarms_split_backup_20240101_020_org.fdroid.fdroid.ab
```

Or, alternatively, if `adb restore` does not work, invoke `bu` via `adb shell`:
```
adb shell 'bu restore' < abarms_split_backup_20240101_020_org.fdroid.fdroid.ab
```

### Rebuild full backup from parts

You can also rebuild the original full-backup from parts via

```
abarms merge abarms_split_backup_20240101_*.ab backup_20240101.rebuilt.ab
```

to check that it produces exactly the same backup file

```
# strip encryption and compression from the original
abarms strip backup_20240101.ab backup_20240101.stripped.ab

# compare to the stipped original and the rebuilt file
diff backup_20240101.stripped.ab backup_20240101.rebuilt.ab || echo differ
```

# Alternatives

## `android-backup-toolkit` and friends

- [android-backup-extractor](https://github.com/nelenkov/android-backup-extractor) is a Java app that can decrypt and decompress Android Backup archives and convert them into TAR.

- [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) builds on top of `android-backup-extractor` and provides a way to split full-system backup ADB files into per-app pieces.

- [android-backup-processor](https://sourceforge.net/projects/android-backup-processor/) is an older version of `android-backup-toolkit`.

## Others

- [This gist by AnatomicJC](https://gist.github.com/AnatomicJC/e773dd55ae60ab0b2d6dd2351eb977c1), among other useful `adb` hacks, shows how to do per-app backups with pure `adb shell` and `adb backup` calls.
  Though, I think `abarms` is a better solution for this, since invoking `adb backup` repeatedly means you'll have to unlock your phone and press "Back up my data" button on the screen repeatedly, `adb backup` followed by `abarms split` is much more convenient.

- [abpy](https://github.com/xBZZZZ/abpy) is a Python utility that can convert Android Backup files into TAR and back, so it's an alternative implementation of `abarms unwrap` and `abarms wrap`. I was unaware it existed when I made this, and I was inspired by checksum verification code there to implement it properly here after I became aware of it.

- [ABX](https://github.com/info-lab/ABX) is a Python utility that can strip Android Backup headers from unencrypted backup files.
  So, basically, it's `abarms unwrap` without decryption support.

## If you have root on your device

Assuming you have root on your Android phone, you can do

```
# check if bmgr is enabled
adb shell bmgr enabled

# list bmgr transports
adb shell bmgr list transports
# localtransport should be there, enable it
adb shell bmgr transport com.android.localtransport/.LocalTransport

# enable bmgr
adb shell bmgr enable true

# do a full backup now
adb shell bmgr fullbackup
```

and then take per-app backup files from `/data/data/com.android.localtransport/files/`.

# License

GPLv3+, small library parts are MIT.

# Usage

## abarms

A handy Swiss-army-knife-like utility for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools.

Android Backup files consist of a metadata header followed by a PAX-formatted TAR files optionally compressed with zlib (the only compressing Android Backup file format supports) optionally encrypted with AES-256 (the only encryption Android Backup file format supports).

Below, all input decryption options apply to all subcommands taking Android Backup files as input(s) and all output encryption options apply to all subcommands producing Android Backup files as output(s).

- options:
  - `--version`
  : show program's version number and exit
  - `-h, --help`
  : show this help message and exit
  - `--markdown`
  : show help messages formatted in Markdown

- input decryption passphrase:
  - `-p PASSPHRASE, --passphrase PASSPHRASE`
  : passphrase for an encrypted `INPUT_AB_FILE`
  - `--passfile PASSFILE`
  : a file containing the passphrase for an encrypted `INPUT_AB_FILE`; similar to `-p` option but the whole contents of the file will be used verbatim, allowing you to, e.g. use new line symbols or strange character encodings in there; default: guess based on `INPUT_AB_FILE` trying to replace ".ab" and ".adb" extensions with ".passphrase.txt"

- input decryption checksum verification:
  - `--ignore-checksum`
  : ignore checksum field in `INPUT_AB_FILE`, useful when decrypting backups produced by weird Android firmwares

- output encryption passphrase:
  - `--output-passphrase OUTPUT_PASSPHRASE`
  : passphrase for an encrypted `OUTPUT_AB_FILE`
  - `--output-passfile OUTPUT_PASSFILE`
  : a file containing the passphrase for an encrypted `OUTPUT_AB_FILE`

- output encryption parameters:
  - `--output-salt-bytes SALT_BYTES`
  : PBKDF2HMAC salt length in bytes (default: 64)
  - `--output-iterations ITERATIONS`
  : PBKDF2HMAC iterations (default: 10000)

- subcommands:
  - `{ls,list,rewrap,strip,ab2ab,split,ab2many,merge,many2ab,unwrap,ab2tar,wrap,tar2ab}`
    - `ls (list)`
    : list contents of an Android Backup file
    - `rewrap (strip, ab2ab)`
    : strip or apply encyption and/or compression from/to an Android Backup file
    - `split (ab2many)`
    : split a full-system Android Backup file into a bunch of per-app Android Backup files
    - `merge (many2ab)`
    : merge a bunch of Android Backup files into one
    - `unwrap (ab2tar)`
    : convert an Android Backup file into a TAR file
    - `wrap (tar2ab)`
    : convert a TAR file into an Android Backup file

### abarms ls

List contents of an Android Backup file similar to how `tar -tvf` would do, but this will also show Android Backup file version, compression, and encryption parameters.

- positional arguments:
  - `INPUT_AB_FILE`
  : an Android Backup file to be used as input, set to "-" to use standard input

### abarms rewrap

Convert a given Android Backup file into another Android Backup file with encyption and/or compression applied or stripped away.

Versioning parameters and the TAR file stored inside the input file are copied into the output file verbatim.

For instance, with this subcommand you can convert an encrypted and compressed Android Backup file into a simple unencrypted and uncompressed version of the same, or vice versa.
The former of which is useful if your Android firmware forces you to encrypt your backups but you store your backups on an encrypted media anyway and don't want to remember more passphrases than strictly necessary.
Or if you want to strip encryption and compression and re-compress using something better than zlib.

- positional arguments:
  - `INPUT_AB_FILE`
  : an Android Backup file to be used as input, set to "-" to use standard input
  - `OUTPUT_AB_FILE`
  : file to write the output to, set to "-" to use standard output; default: "-" if `INPUT_TAR_FILE` is "-", otherwise replace ".ab" and ".adb" extension of `INPUT_TAR_FILE` with `.stripped.ab`

- options:
  - `-d, --decompress`
  : produce decompressed output; this is the default
  - `-k, --keep-compression`
  : copy compression flag and data from input to output verbatim; this will make the output into a compressed Android Backup file if the input Android Backup file is compressed; this is the fastest way to `strip`, since it just copies bytes around
  - `-c, --compress`
  : (re-)compress the output file; it will use higher compression level defaults than those used by Android, so enabling this option could make it take awhile
  - `-e, --encrypt`
  : (re-)encrypt the output file; enabling this option costs basically nothing on a modern CPU

### abarms split

Split a full-system Android Backup file into a bunch of per-app Android Backup files.

Resulting per-app files can be given to `adb restore` to restore selected apps.

Also, if you do backups regularly, then splitting large Android Backup files like this and deduplicating per-app files between backups could save a lot of disk space.

- positional arguments:
  - `INPUT_AB_FILE`
  : an Android Backup file to be used as input, set to "-" to use standard input

- options:
  - `-c, --compress`
  : compress per-app output files
  - `-e, --encrypt`
  : encrypt per-app output files; when enabled, the `--output-passphrase` will be reused for all the generated files (but all encryption keys will be unique)
  - `--prefix PREFIX`
  : file name prefix for output files; default: `abarms_split_backup` if `INPUT_AB_FILE` is "-", `abarms_split_<INPUT_AB_FILE without its ".ab" or ".adb" extension>` otherwise

### abarms merge

Merge many smaller Android Backup files into a single larger one.
A reverse operation to `split`.

This exists mostly for checking that `split` is not buggy.

- positional arguments:
  - `INPUT_AB_FILE`
  : Android Backup files to be used as inputs
  - `OUTPUT_AB_FILE`
  : file to write the output to

- options:
  - `-c, --compress`
  : compress the output file
  - `-e, --encrypt`
  : encrypt the output file

### abarms unwrap

Convert Android Backup file into a TAR file by stripping Android Backup header, decrypting and decompressing as necessary.

The TAR file stored inside the input file gets copied into the output file verbatim.

- positional arguments:
  - `INPUT_AB_FILE`
  : an Android Backup file to be used as input, set to "-" to use standard input
  - `OUTPUT_TAR_FILE`
  : file to write output to, set to "-" to use standard output; default: guess based on `INPUT_AB_FILE` while setting extension to `.tar`

### abarms wrap

Convert a TAR file into an Android Backup file by prepending Android Backup header, compressing and encrypting as requested.

The input TAR file gets copied into the output file verbatim.

Note that unwrapping a `.ab` file, unpacking the resulting `.tar`, editing the resulting files, packing them back with GNU `tar` utility, running `abarms wrap`, and then running `adb restore` on the resulting file will probably crash your Android device (phone or whatever) because the Android-side code restoring from the backup expects the data in the packed TAR to be in a certain order and have certain PAX headers, which GNU `tar` will not produce.

So you should only use this on files previously produced by `abarms unwrap` or if you know what it is you are doing.

- positional arguments:
  - `INPUT_TAR_FILE`
  : a TAR file to be used as input, set to "-" to use standard input
  - `OUTPUT_AB_FILE`
  : file to write the output to, set to "-" to use standard output; default: "-" if `INPUT_TAR_FILE` is "-", otherwise replace ".ab" and ".adb" extension of `INPUT_TAR_FILE` with `.ab`

- options:
  - `-c, --compress`
  : compress the output file
  - `-e, --encrypt`
  : encrypt the output file
  - `--output-version OUTPUT_VERSION`
  : Android Backup file version to use (required)

## Usage notes

Giving an encrypted `INPUT_AB_FILE` as input, not specifying `--passphrase` or `--passfile`, and not having a file named `{INPUT_AB_FILE with ".ab" or ".adb" extension replaced with ".passphrase.txt"}` in the same directory will case the passphrase to be read interactively from the tty.

## Examples

- List contents of an Android Backup file:
  ```
  abarms ls backup.ab
  ```

- Use `tar` util to list contents of an Android Backup file instead of running `abarms ls`:
  ```
  abarms unwrap backup.ab - | tar -tvf -
  ```

- Extract contents of an Android Backup file:
  ```
  abarms unwrap backup.ab - | tar -xvf -
  ```

- Strip encryption and compression from an Android Backup file:
  ```
  # equivalent
  abarms strip backup.ab backup.stripped.ab
  abarms strip backup.ab
  ```

  ```
  # equivalent
  abarms strip --passphrase secret backup.ab
  abarms strip -p secret backup.ab
  ```

  ```
  # with passphrase taken from a file
  echo -n secret > backup.passphrase.txt
  # equivalent
  abarms strip backup.ab
  abarms strip --passfile backup.passphrase.txt backup.ab
  ```

  ```
  # with a weird passphrase taken from a file
  echo -ne "secret\r\n\x00another line" > backup.passphrase.txt
  abarms strip backup.ab
  ```

- Strip encryption but keep compression, if any:
  ```
  # equivalent
  abarms strip --keep-compression backup.ab backup.stripped.ab
  abarms strip -k backup.ab
  ```

- Strip encryption and compression from an Android Backup file and then re-compress using `xz`:
  ```
  abarms strip backup.ab - | xz --compress -9 - > backup.ab.xz
  # ... and then convert to tar and list contents:
  xzcat backup.ab.xz | abarms unwrap - | tar -tvf -
  ```

- Convert an Android Backup file into a TAR archive:
  ```
  # equivalent
  abarms unwrap backup.ab backup.tar
  abarms unwrap backup.ab
  ```

- Convert a TAR archive into an Android Backup file:
  ```
  # equivalent
  abarms wrap --output-version=5 backup.tar backup.ab
  abarms wrap --output-version=5 backup.tar
  ```


            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "abarms",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": null,
    "keywords": "android, android backup, adb, ab, adb backup",
    "author": null,
    "author_email": "Jan Malakhovski <oxij@oxij.org>",
    "download_url": "https://files.pythonhosted.org/packages/bb/3d/2fc849b6194a5fc8529cf6d20a1c960ea8c95bb77a127f9d94d8b47fcdd5/abarms-1.1.1.tar.gz",
    "platform": null,
    "description": "# What is `abarms`?\n\n`abarms` is a *handy* Swiss-army-knife-like tool for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools.\n\n`abarms` can\n\n- list contents of Android Backup files,\n- strip encryption and compression from Android Backup files (so that you could re-compress them with something better for long-term storage),\n- convert Android Backup files into TAR files (which you can then unpack with standard `tar`),\n- convert TAR files into Android Backup files (though, see the documentation for `abarms wrap` below explaining why you should be careful about doing that),\n- split Android Backup files into smaller by-app backups (each of which you can then give to `adb restore` to restore that one app, or just file-level de-duplicate them between different backups),\n- merge those back into full-system backups like those produced by `adb backup`,\n- and other similar things.\n\nBasically, this is a simpler pure Python implementation (only requires `setuptools` and `cryptography` modules) of [android-backup-extractor](https://github.com/nelenkov/android-backup-extractor) and the parts of [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) and [android-backup-processor](https://sourceforge.net/projects/android-backup-processor/) that I use myself.\n\n`abarms` will run on Linux and all other POSIX-compatible operating systems Python supports.\nThe author also expects it will work fine on Windows, even though it was not tested there (do report an Issue if it does not).\n\n# <span id=\"why\"/>Why does `abarms` exists?\n\nRead the parts highlighted in bold in the following subsection.\n\n## <span id=\"adb-backup\"/>UNIX in 1970s had better system backup tools than current Android OS\n\n**Did you know that your Android OS device already has an awesome built-in full-system phone-to-PC backup and PC-to-phone restore tool that does not require root access?**\n`adb` utility of Android Platform Tools has `adb backup` subcommand that, in principle, can do basically everything you could possibly want there.\n\nInternally this is implemented via Android OS setuid root binary named `bu` --- which you can run manually via `adb shell bu help` --- that simply backs up every app on the device one by one and streams the resulting `.ab` file --- which is a wrapped PAX-formatted TAR file (see \"EXTENDED DESCRIPTION\" section in [`man 1 pax`](https://man7.org/linux/man-pages/man1/pax.1p.html#EXTENDED_DESCRIPTION)) --- to stdout. `adb backup` subcommand is just a simple wrapper around it.\n\n**But then Android Platform Tools bundle gives no tools to manipulate those backup files!\nSo, if you make a full-system backup with `adb backup`, and then want to restore a single app out of 100+ you have installed on your device, you need third-party tools now.**\nThis is kind of embarrassing, to be honest.\nA tool to manipulate backup files should have been a standard utility in Android Platform Tools since Android version 0.1 or something.\n(Seriously, are you not embarrassed? I'm embarrassed for the state of humanity thinking about how the most popular OS on the planet gives no widely accessible local backup and restore tools on par with what every user of 1970s-era UNIX mainframe had out of the box. I'm not asking for automatic opportunistic incremental quantum-safely encrypted full-system replication to cooperative nearby devices in a local mesh-network here!)\n\nWell, technically speaking, Android OS also has automatic scheduled non-interactive backup service `bmgr` --- which can be controlled via Android settings menu and `adb shell bmgr help`, that does per-app backups and restores.\nInternally, `bmgr` service also generates `.ab` files and then either uploads them to Google --- which is the default and the only option available through the settings menu --- or stores them locally under `/data/data/com.android.localtransport/files/` --- which requires root to access.\nOn old Android versions you could ask `bmgr` to do a backup to an SD card directly from the settings menu, but Google removed that functionality to force users to use Cloud-based backups.\n\nSo, basically, according to Google (and Samsung, which ship with their own `bmgr`-like service in parallel with `bmgr`), to restore to a previous state of an app, or to migrate between phones you now apparently have to upload all your data to their servers in plain-text for their convenient data-mining and selling of your data to interested third parties.\nGoogle even went as far as to hide `adb backup` subcommand from their official Android documentation: compare the [old manual for `adb`](https://web.archive.org/web/20180426100826/https://developer.android.com/studio/command-line/adb) with the [current one](https://web.archive.org/web/20240129131223/https://developer.android.com/tools/adb), Control+F for \"backup\".\n\nThis resulted into every Android vendor now making their own vendor-specific phone-to-phone migration utilities, and a whole ecosystem of commercial apps that do what `adb backup` already does, but worse.\n\nThis also resulted in usefulness of `adb backup` itself being reduced because in Android version 6 Google made automatic daily file-based backups that get uploaded to Google the default when you attach your phone to your Google account.\nSo, most apps started to opt-out of those backups for privacy and security reasons -- which also started opting them out of being included in `adb backup` output, since `bmgr` and `bu` share most of the infrastructure.\nSome of those apps now implement their own in-app backup buttons hidden away in the settings menu somewhere, but most do not.\n\nYes, this is stupid, see [this discussion on StackOverflow](https://stackoverflow.com/questions/12648373/what-is-androidallowbackup).\nSee also old Android developer docs that explained this fairly clearly [here](https://web.archive.org/web/20181122123338/https://developer.android.com/guide/topics/data/backup) and [here](https://web.archive.org/web/20181118184751/https://developer.android.com/guide/topics/data/testingbackup).\n\n(You can also force an app to be included in `adb backup` by rebuilding its APK to enable `android:allowBackup` attribute in the manifest and installing the result manually, see [this](https://stackpointer.io/mobile/android-enable-adb-backup-for-any-app/462/) for more info.\nBut this will only work for newly installed apps as you will have to re-sign the resulting APK with your own private key and Android forbids app updates that change the signing key.)\n\nBut, hopefully, eventually, some alternative firmware developer will fix the above bug and allow `adb backup` to backup all apps regardless of `android:allowBackup` manifest setting, as it should.\n\nStill, `adb backup` works fine for a lot of apps and, hopefully, will eventually get back to working as well as it did before Android version 6 in the future.\nMeanwhile, [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) allows you to split full-system dumps produced by `adb backup` into per-app backups that can then be restored with `adb restore`.\n\nThe problem is that, while I'm thankful that [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) exists, I find it really annoying to use: it is a bundle of pre-compiled Java apps, binaries, and shell scripts that manages to work somehow, but modifying anything there is basically impossible as building all of those things from sources is an adventure I failed to complete, and then you need to install the gigantic Java VM and libraries to run it all.\n\n**So, as it currently stands, to have per-app backups of your Android device you have to either:**\n\n- **root your device;**\n- **give up your privacy by uploading your backups to other people's computers (aka \"the cloud\"); or**\n- **repack all you APKs with `android:allowBackup = true` and either run older Android firmware that can do backup to an SD card or run `adb backup` from your PC, and then extract per-app backups from its output with third-party tools like [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) (yes, this is not ideal, but it works, and does not need root).**\n\n**So, one day I was looking at all of this.\nI couldn't root or change the firmware on a phone I wanted to keep backed up, but I could follow the last option and get most of what I wanted with almost no effort.\nExcept figuring out how to run `android-backup-toolkit` to do the very last step of this took me quite a while.\nAnd so I thought, \"Hmm, this seems overly complicated, something as simple as splitting and merging TAR files with some additional headers should be doable with a simple Python program.\"\nSo I made one.**\n\nIt turned out to be a bit less simple than I though it would be, mostly because Python's `tarfile` module was not designed for this, so I had to make my own, and PAX-formatted TAR files are kind of ugly to parse, but it works now, so, eh.\n\n**Hopefully, `abarms` existing will inspire more app and alternative firmware developers to support `adb backup` properly and so personal computing devices of late 2020s will finally reach feature parity with 1970s-era Tape ARchiving (TAR) backup technology.**\n(You can backup any UNIX box to an external HDD with `tar -cvvf /media/external/backup.tar --one-file-system /`.\nYes, it will actually work.)\n\n# Quickstart\n\n## Installation\n\n- Install with:\n  ``` {.bash}\n  pip install abarms\n  ```\n  and run as\n  ``` {.bash}\n  abarms --help\n  ```\n- Alternatively, install it via Nix\n  ``` {.bash}\n  nix-env -i -f ./default.nix\n  abarms --help\n  ```\n- Alternatively, run without installing:\n  ``` {.bash}\n  alias abarms=\"python3 -m abarms\"\n  abarms --help\n  ```\n\n## Backup all apps from your Android device, then restore a single app, without root\n\n### Prepare your PC and phone\n\nBefore you make a full backup of your Android phone (or other device) you need to\n\n- install Android Platform Tools (either from [there](https://developer.android.com/tools/releases/platform-tools) or from you distribution);\n\n- enable \"Developer Mode\" and turn on \"USB Debugging\" in \"Developer Options\" (see [Android Docs](https://web.archive.org/web/20240129131223/https://developer.android.com/tools/adb) for instructions);\n\n- then, usually, on your PC you need to run\n\n  ```\n  sudo adb kill-server\n  sudo adb start-server\n  ```\n\n  unless, you added special UDev rules for your phone.\n\nAdditionally, depending your device, you might also need to enable \"Stay awake\" in \"Developer Options\", otherwise long enough backups might get interrupted in the middle by your device going to sleep.\nPersonally, I find having it enabled kind of annoying, so I recommend trying to do everything below with it disabled first, and enable it only if your backups get truncated.\n\n### Do a full backup\n\nTo do the backup, you need to\n\n- unlock your phone and connect it to your PC via a USB cable (in that order, otherwise USB Debugging will be disabled),\n\n- confirm that the PC is allowed to do USB Debugging in the popup on the phone, then\n\n- run\n\n  ```\n  adb backup -apk -obb -all -system -keyvalue\n  ```\n\n  on your PC (see below if that does not work),\n\n- unlock your phone again, and\n\n- press \"Back up my data\" button at the bottom of your screen.\n\nNow you need to wait awhile for `adb` to finish.\nThe result will be saved in `backup.ab` file.\n\nIf you want to backup to an explicitly named file, e.g. to note the date of the backup, run\n\n```\nadb backup -f backup_20240101.ab -apk -obb -all -system -keyvalue\n```\n\nIf `adb backup` does not work, you can invoke `bu` via `adb shell` instead:\n\n```\nadb shell 'bu backup -apk -obb -all -system -keyvalue' > backup_20240101.ab\n```\n\n### Split it into pieces\n\nYou can view contents of the backup via\n\n```\nabarms ls backup_20240101.ab\n```\n\nand split it into per-app backups via\n\n```\nabarms split backup_20240101.ab\n```\n\nwhich will produce a bunch of files named `abarms_split_<filename>_<num>_<appname>.ab` (e.g. `abarms_split_backup_20240101_020_org.fdroid.fdroid.ab`).\n\n### Restore a single app\n\nA single per-app file can be fed back to `adb restore` to restore that singe app, e.g.\n\n```\nadb restore abarms_split_backup_20240101_020_org.fdroid.fdroid.ab\n```\n\nOr, alternatively, if `adb restore` does not work, invoke `bu` via `adb shell`:\n```\nadb shell 'bu restore' < abarms_split_backup_20240101_020_org.fdroid.fdroid.ab\n```\n\n### Rebuild full backup from parts\n\nYou can also rebuild the original full-backup from parts via\n\n```\nabarms merge abarms_split_backup_20240101_*.ab backup_20240101.rebuilt.ab\n```\n\nto check that it produces exactly the same backup file\n\n```\n# strip encryption and compression from the original\nabarms strip backup_20240101.ab backup_20240101.stripped.ab\n\n# compare to the stipped original and the rebuilt file\ndiff backup_20240101.stripped.ab backup_20240101.rebuilt.ab || echo differ\n```\n\n# Alternatives\n\n## `android-backup-toolkit` and friends\n\n- [android-backup-extractor](https://github.com/nelenkov/android-backup-extractor) is a Java app that can decrypt and decompress Android Backup archives and convert them into TAR.\n\n- [android-backup-toolkit](https://sourceforge.net/projects/android-backup-toolkit/) builds on top of `android-backup-extractor` and provides a way to split full-system backup ADB files into per-app pieces.\n\n- [android-backup-processor](https://sourceforge.net/projects/android-backup-processor/) is an older version of `android-backup-toolkit`.\n\n## Others\n\n- [This gist by AnatomicJC](https://gist.github.com/AnatomicJC/e773dd55ae60ab0b2d6dd2351eb977c1), among other useful `adb` hacks, shows how to do per-app backups with pure `adb shell` and `adb backup` calls.\n  Though, I think `abarms` is a better solution for this, since invoking `adb backup` repeatedly means you'll have to unlock your phone and press \"Back up my data\" button on the screen repeatedly, `adb backup` followed by `abarms split` is much more convenient.\n\n- [abpy](https://github.com/xBZZZZ/abpy) is a Python utility that can convert Android Backup files into TAR and back, so it's an alternative implementation of `abarms unwrap` and `abarms wrap`. I was unaware it existed when I made this, and I was inspired by checksum verification code there to implement it properly here after I became aware of it.\n\n- [ABX](https://github.com/info-lab/ABX) is a Python utility that can strip Android Backup headers from unencrypted backup files.\n  So, basically, it's `abarms unwrap` without decryption support.\n\n## If you have root on your device\n\nAssuming you have root on your Android phone, you can do\n\n```\n# check if bmgr is enabled\nadb shell bmgr enabled\n\n# list bmgr transports\nadb shell bmgr list transports\n# localtransport should be there, enable it\nadb shell bmgr transport com.android.localtransport/.LocalTransport\n\n# enable bmgr\nadb shell bmgr enable true\n\n# do a full backup now\nadb shell bmgr fullbackup\n```\n\nand then take per-app backup files from `/data/data/com.android.localtransport/files/`.\n\n# License\n\nGPLv3+, small library parts are MIT.\n\n# Usage\n\n## abarms\n\nA handy Swiss-army-knife-like utility for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools.\n\nAndroid Backup files consist of a metadata header followed by a PAX-formatted TAR files optionally compressed with zlib (the only compressing Android Backup file format supports) optionally encrypted with AES-256 (the only encryption Android Backup file format supports).\n\nBelow, all input decryption options apply to all subcommands taking Android Backup files as input(s) and all output encryption options apply to all subcommands producing Android Backup files as output(s).\n\n- options:\n  - `--version`\n  : show program's version number and exit\n  - `-h, --help`\n  : show this help message and exit\n  - `--markdown`\n  : show help messages formatted in Markdown\n\n- input decryption passphrase:\n  - `-p PASSPHRASE, --passphrase PASSPHRASE`\n  : passphrase for an encrypted `INPUT_AB_FILE`\n  - `--passfile PASSFILE`\n  : a file containing the passphrase for an encrypted `INPUT_AB_FILE`; similar to `-p` option but the whole contents of the file will be used verbatim, allowing you to, e.g. use new line symbols or strange character encodings in there; default: guess based on `INPUT_AB_FILE` trying to replace \".ab\" and \".adb\" extensions with \".passphrase.txt\"\n\n- input decryption checksum verification:\n  - `--ignore-checksum`\n  : ignore checksum field in `INPUT_AB_FILE`, useful when decrypting backups produced by weird Android firmwares\n\n- output encryption passphrase:\n  - `--output-passphrase OUTPUT_PASSPHRASE`\n  : passphrase for an encrypted `OUTPUT_AB_FILE`\n  - `--output-passfile OUTPUT_PASSFILE`\n  : a file containing the passphrase for an encrypted `OUTPUT_AB_FILE`\n\n- output encryption parameters:\n  - `--output-salt-bytes SALT_BYTES`\n  : PBKDF2HMAC salt length in bytes (default: 64)\n  - `--output-iterations ITERATIONS`\n  : PBKDF2HMAC iterations (default: 10000)\n\n- subcommands:\n  - `{ls,list,rewrap,strip,ab2ab,split,ab2many,merge,many2ab,unwrap,ab2tar,wrap,tar2ab}`\n    - `ls (list)`\n    : list contents of an Android Backup file\n    - `rewrap (strip, ab2ab)`\n    : strip or apply encyption and/or compression from/to an Android Backup file\n    - `split (ab2many)`\n    : split a full-system Android Backup file into a bunch of per-app Android Backup files\n    - `merge (many2ab)`\n    : merge a bunch of Android Backup files into one\n    - `unwrap (ab2tar)`\n    : convert an Android Backup file into a TAR file\n    - `wrap (tar2ab)`\n    : convert a TAR file into an Android Backup file\n\n### abarms ls\n\nList contents of an Android Backup file similar to how `tar -tvf` would do, but this will also show Android Backup file version, compression, and encryption parameters.\n\n- positional arguments:\n  - `INPUT_AB_FILE`\n  : an Android Backup file to be used as input, set to \"-\" to use standard input\n\n### abarms rewrap\n\nConvert a given Android Backup file into another Android Backup file with encyption and/or compression applied or stripped away.\n\nVersioning parameters and the TAR file stored inside the input file are copied into the output file verbatim.\n\nFor instance, with this subcommand you can convert an encrypted and compressed Android Backup file into a simple unencrypted and uncompressed version of the same, or vice versa.\nThe former of which is useful if your Android firmware forces you to encrypt your backups but you store your backups on an encrypted media anyway and don't want to remember more passphrases than strictly necessary.\nOr if you want to strip encryption and compression and re-compress using something better than zlib.\n\n- positional arguments:\n  - `INPUT_AB_FILE`\n  : an Android Backup file to be used as input, set to \"-\" to use standard input\n  - `OUTPUT_AB_FILE`\n  : file to write the output to, set to \"-\" to use standard output; default: \"-\" if `INPUT_TAR_FILE` is \"-\", otherwise replace \".ab\" and \".adb\" extension of `INPUT_TAR_FILE` with `.stripped.ab`\n\n- options:\n  - `-d, --decompress`\n  : produce decompressed output; this is the default\n  - `-k, --keep-compression`\n  : copy compression flag and data from input to output verbatim; this will make the output into a compressed Android Backup file if the input Android Backup file is compressed; this is the fastest way to `strip`, since it just copies bytes around\n  - `-c, --compress`\n  : (re-)compress the output file; it will use higher compression level defaults than those used by Android, so enabling this option could make it take awhile\n  - `-e, --encrypt`\n  : (re-)encrypt the output file; enabling this option costs basically nothing on a modern CPU\n\n### abarms split\n\nSplit a full-system Android Backup file into a bunch of per-app Android Backup files.\n\nResulting per-app files can be given to `adb restore` to restore selected apps.\n\nAlso, if you do backups regularly, then splitting large Android Backup files like this and deduplicating per-app files between backups could save a lot of disk space.\n\n- positional arguments:\n  - `INPUT_AB_FILE`\n  : an Android Backup file to be used as input, set to \"-\" to use standard input\n\n- options:\n  - `-c, --compress`\n  : compress per-app output files\n  - `-e, --encrypt`\n  : encrypt per-app output files; when enabled, the `--output-passphrase` will be reused for all the generated files (but all encryption keys will be unique)\n  - `--prefix PREFIX`\n  : file name prefix for output files; default: `abarms_split_backup` if `INPUT_AB_FILE` is \"-\", `abarms_split_<INPUT_AB_FILE without its \".ab\" or \".adb\" extension>` otherwise\n\n### abarms merge\n\nMerge many smaller Android Backup files into a single larger one.\nA reverse operation to `split`.\n\nThis exists mostly for checking that `split` is not buggy.\n\n- positional arguments:\n  - `INPUT_AB_FILE`\n  : Android Backup files to be used as inputs\n  - `OUTPUT_AB_FILE`\n  : file to write the output to\n\n- options:\n  - `-c, --compress`\n  : compress the output file\n  - `-e, --encrypt`\n  : encrypt the output file\n\n### abarms unwrap\n\nConvert Android Backup file into a TAR file by stripping Android Backup header, decrypting and decompressing as necessary.\n\nThe TAR file stored inside the input file gets copied into the output file verbatim.\n\n- positional arguments:\n  - `INPUT_AB_FILE`\n  : an Android Backup file to be used as input, set to \"-\" to use standard input\n  - `OUTPUT_TAR_FILE`\n  : file to write output to, set to \"-\" to use standard output; default: guess based on `INPUT_AB_FILE` while setting extension to `.tar`\n\n### abarms wrap\n\nConvert a TAR file into an Android Backup file by prepending Android Backup header, compressing and encrypting as requested.\n\nThe input TAR file gets copied into the output file verbatim.\n\nNote that unwrapping a `.ab` file, unpacking the resulting `.tar`, editing the resulting files, packing them back with GNU `tar` utility, running `abarms wrap`, and then running `adb restore` on the resulting file will probably crash your Android device (phone or whatever) because the Android-side code restoring from the backup expects the data in the packed TAR to be in a certain order and have certain PAX headers, which GNU `tar` will not produce.\n\nSo you should only use this on files previously produced by `abarms unwrap` or if you know what it is you are doing.\n\n- positional arguments:\n  - `INPUT_TAR_FILE`\n  : a TAR file to be used as input, set to \"-\" to use standard input\n  - `OUTPUT_AB_FILE`\n  : file to write the output to, set to \"-\" to use standard output; default: \"-\" if `INPUT_TAR_FILE` is \"-\", otherwise replace \".ab\" and \".adb\" extension of `INPUT_TAR_FILE` with `.ab`\n\n- options:\n  - `-c, --compress`\n  : compress the output file\n  - `-e, --encrypt`\n  : encrypt the output file\n  - `--output-version OUTPUT_VERSION`\n  : Android Backup file version to use (required)\n\n## Usage notes\n\nGiving an encrypted `INPUT_AB_FILE` as input, not specifying `--passphrase` or `--passfile`, and not having a file named `{INPUT_AB_FILE with \".ab\" or \".adb\" extension replaced with \".passphrase.txt\"}` in the same directory will case the passphrase to be read interactively from the tty.\n\n## Examples\n\n- List contents of an Android Backup file:\n  ```\n  abarms ls backup.ab\n  ```\n\n- Use `tar` util to list contents of an Android Backup file instead of running `abarms ls`:\n  ```\n  abarms unwrap backup.ab - | tar -tvf -\n  ```\n\n- Extract contents of an Android Backup file:\n  ```\n  abarms unwrap backup.ab - | tar -xvf -\n  ```\n\n- Strip encryption and compression from an Android Backup file:\n  ```\n  # equivalent\n  abarms strip backup.ab backup.stripped.ab\n  abarms strip backup.ab\n  ```\n\n  ```\n  # equivalent\n  abarms strip --passphrase secret backup.ab\n  abarms strip -p secret backup.ab\n  ```\n\n  ```\n  # with passphrase taken from a file\n  echo -n secret > backup.passphrase.txt\n  # equivalent\n  abarms strip backup.ab\n  abarms strip --passfile backup.passphrase.txt backup.ab\n  ```\n\n  ```\n  # with a weird passphrase taken from a file\n  echo -ne \"secret\\r\\n\\x00another line\" > backup.passphrase.txt\n  abarms strip backup.ab\n  ```\n\n- Strip encryption but keep compression, if any:\n  ```\n  # equivalent\n  abarms strip --keep-compression backup.ab backup.stripped.ab\n  abarms strip -k backup.ab\n  ```\n\n- Strip encryption and compression from an Android Backup file and then re-compress using `xz`:\n  ```\n  abarms strip backup.ab - | xz --compress -9 - > backup.ab.xz\n  # ... and then convert to tar and list contents:\n  xzcat backup.ab.xz | abarms unwrap - | tar -tvf -\n  ```\n\n- Convert an Android Backup file into a TAR archive:\n  ```\n  # equivalent\n  abarms unwrap backup.ab backup.tar\n  abarms unwrap backup.ab\n  ```\n\n- Convert a TAR archive into an Android Backup file:\n  ```\n  # equivalent\n  abarms wrap --output-version=5 backup.tar backup.ab\n  abarms wrap --output-version=5 backup.tar\n  ```\n\n",
    "bugtrack_url": null,
    "license": "GPL-3.0-or-later",
    "summary": "A handy Swiss-army-knife-like utility for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools",
    "version": "1.1.1",
    "project_urls": {
        "GitHub": "https://github.com/Own-Data-Privateer/abarms",
        "Homepage": "https://oxij.org/software/abarms/",
        "Support Development": "https://oxij.org/#support"
    },
    "split_keywords": [
        "android",
        " android backup",
        " adb",
        " ab",
        " adb backup"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "50056bcc6887431c6fb2e0e195f7cb70e4695dffe02420186175152f76eabcb3",
                "md5": "8f961c419dabb44ac102d0a744bbce5c",
                "sha256": "b446a8f307025e52c1d958a6dad726c495dd19e7c41a33aa4c77bb37cd94637d"
            },
            "downloads": -1,
            "filename": "abarms-1.1.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "8f961c419dabb44ac102d0a744bbce5c",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 38707,
            "upload_time": "2024-03-22T09:23:21",
            "upload_time_iso_8601": "2024-03-22T09:23:21.339850Z",
            "url": "https://files.pythonhosted.org/packages/50/05/6bcc6887431c6fb2e0e195f7cb70e4695dffe02420186175152f76eabcb3/abarms-1.1.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "bb3d2fc849b6194a5fc8529cf6d20a1c960ea8c95bb77a127f9d94d8b47fcdd5",
                "md5": "7ccd9eb6bde33df644fb527b05066ade",
                "sha256": "87d09ddc4a6ee0a9bb93c06707eed605d89bbd1b5b73d0443fb1ebc2eebc4062"
            },
            "downloads": -1,
            "filename": "abarms-1.1.1.tar.gz",
            "has_sig": false,
            "md5_digest": "7ccd9eb6bde33df644fb527b05066ade",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 44398,
            "upload_time": "2024-03-22T09:23:23",
            "upload_time_iso_8601": "2024-03-22T09:23:23.506451Z",
            "url": "https://files.pythonhosted.org/packages/bb/3d/2fc849b6194a5fc8529cf6d20a1c960ea8c95bb77a127f9d94d8b47fcdd5/abarms-1.1.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-03-22 09:23:23",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "Own-Data-Privateer",
    "github_project": "abarms",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "abarms"
}
        
Elapsed time: 0.32440s