peskytm


Namepeskytm JSON
Version 1.0.0 PyPI version JSON
download
home_pageNone
SummaryUnmount pesky Time Machine Volumes
upload_time2025-07-14 17:54:47
maintainerNone
docs_urlNone
authorNone
requires_pythonNone
licenseNone
keywords osx time machine
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI
coveralls test coverage No coveralls.
            [![Build Status](https://app.travis-ci.com/hasii2011/peskytm.svg?branch=master)](https://app.travis-ci.com/hasii2011/pyut2xml)
[![Maintenance](https://img.shields.io/badge/Maintained%3F-yes-green.svg)](https://GitHub.com/Naereen/StrapDown.js/graphs/commit-activity)
[![forthebadge made-with-python](http://ForTheBadge.com/images/badges/made-with-python.svg)](https://www.python.org/)

# Introduction

This utility is an update to a [blog post](https://hsanchezii.wordpress.com/2022/04/12/manually-verify-time-machine-snapshots/) that aimed to help OS X users verify external Time Machine disks and overcome a diskutil deficiency. 

# Rationale

The blog entry notes that a user can use the graphical Disk Utility in a certain order to unmount the Time Machine volume and then use the utility to "*Repair*" the volume.

Unfortunately, even after unmounting the volume OS X leaves what I think are local snapshots mounted that reference the external volume.  They are of the form:

`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 on /Volumes/ . . . . . . .`



Thus, the Repair operation fails.



This utility manually unmounts those *pesky* time machine volumes



```
Usage
peskytm --help
Usage: peskytm.py [OPTIONS]

Options:
  --version  Show the version and exit.
  --help     Show this message and exit.

```

Notice this utility has no parameters.  You simply execute it.  Internally, `peskytm` use `sudo`, so you will be prompted for your OS X password (Don't worry the utility does nothing but pass it along).  You will then see output like the following:



`peskytm`

`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-09-221954.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-16-141610.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-26-120444.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-10-06-172708.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-10-14-144954.backup@/dev/disk7s2 unmounted`



Once you manually unmount this pesky volumes you can either use the graphical utility or the command line utility (CLI).  An example, usage of the CLI is:



`sudo fsck_apfs -y /dev/disk7s2`



# How to Install

`pipx install peskytm`


            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "peskytm",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": "\"Humberto A. Sanchez II\" <Humberto.A.Sanchez.II@gmail.com>",
    "keywords": "OSX, time machine",
    "author": null,
    "author_email": "\"Humberto A. Sanchez II\" <Humberto.A.Sanchez.II@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/08/29/94a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72/peskytm-1.0.0.tar.gz",
    "platform": null,
    "description": "[![Build Status](https://app.travis-ci.com/hasii2011/peskytm.svg?branch=master)](https://app.travis-ci.com/hasii2011/pyut2xml)\n[![Maintenance](https://img.shields.io/badge/Maintained%3F-yes-green.svg)](https://GitHub.com/Naereen/StrapDown.js/graphs/commit-activity)\n[![forthebadge made-with-python](http://ForTheBadge.com/images/badges/made-with-python.svg)](https://www.python.org/)\n\n# Introduction\n\nThis utility is an update to a [blog post](https://hsanchezii.wordpress.com/2022/04/12/manually-verify-time-machine-snapshots/) that aimed to help OS X users verify external Time Machine disks and overcome a diskutil deficiency. \n\n# Rationale\n\nThe blog entry notes that a user can use the graphical Disk Utility in a certain order to unmount the Time Machine volume and then use the utility to \"*Repair*\" the volume.\n\nUnfortunately, even after unmounting the volume OS X leaves what I think are local snapshots mounted that reference the external volume.  They are of the form:\n\n`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 on /Volumes/ . . . . . . .`\n\n\n\nThus, the Repair operation fails.\n\n\n\nThis utility manually unmounts those *pesky* time machine volumes\n\n\n\n```\nUsage\npeskytm --help\nUsage: peskytm.py [OPTIONS]\n\nOptions:\n  --version  Show the version and exit.\n  --help     Show this message and exit.\n\n```\n\nNotice this utility has no parameters.  You simply execute it.  Internally, `peskytm` use `sudo`, so you will be prompted for your OS X password (Don't worry the utility does nothing but pass it along).  You will then see output like the following:\n\n\n\n`peskytm`\n\n`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-09-221954.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-16-141610.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-26-120444.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-10-06-172708.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-10-14-144954.backup@/dev/disk7s2 unmounted`\n\n\n\nOnce you manually unmount this pesky volumes you can either use the graphical utility or the command line utility (CLI).  An example, usage of the CLI is:\n\n\n\n`sudo fsck_apfs -y /dev/disk7s2`\n\n\n\n# How to Install\n\n`pipx install peskytm`\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Unmount pesky Time Machine Volumes",
    "version": "1.0.0",
    "project_urls": {
        "Repository": "https://github.com/hasii2011/peskytm"
    },
    "split_keywords": [
        "osx",
        " time machine"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "d9373cba260a3c676b210a88b6355c0ff5f5c7714dbf43e1d694a005ad0940dd",
                "md5": "e998f2fe7eb297ece33806ddb3ee23ce",
                "sha256": "2bf58b027fb9a6b762874e97fbbac061e4e23a3643b906c8980d4a71ea6d28f6"
            },
            "downloads": -1,
            "filename": "peskytm-1.0.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "e998f2fe7eb297ece33806ddb3ee23ce",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 16685,
            "upload_time": "2025-07-14T17:54:46",
            "upload_time_iso_8601": "2025-07-14T17:54:46.355419Z",
            "url": "https://files.pythonhosted.org/packages/d9/37/3cba260a3c676b210a88b6355c0ff5f5c7714dbf43e1d694a005ad0940dd/peskytm-1.0.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "082994a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72",
                "md5": "0bee5948838247fd26c917042ed197c1",
                "sha256": "643c0231476e61909a45fa9893279d28d3b2f4bd69ca560b14d88b7a71360c26"
            },
            "downloads": -1,
            "filename": "peskytm-1.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "0bee5948838247fd26c917042ed197c1",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 16402,
            "upload_time": "2025-07-14T17:54:47",
            "upload_time_iso_8601": "2025-07-14T17:54:47.590720Z",
            "url": "https://files.pythonhosted.org/packages/08/29/94a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72/peskytm-1.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-14 17:54:47",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "hasii2011",
    "github_project": "peskytm",
    "travis_ci": true,
    "coveralls": false,
    "github_actions": true,
    "lcname": "peskytm"
}
        
Elapsed time: 0.43408s