Name | peskytm JSON |
Version |
1.0.0
JSON |
| download |
home_page | None |
Summary | Unmount pesky Time Machine Volumes |
upload_time | 2025-07-14 17:54:47 |
maintainer | None |
docs_url | None |
author | None |
requires_python | None |
license | None |
keywords |
osx
time machine
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
|
coveralls test coverage |
No coveralls.
|
[](https://app.travis-ci.com/hasii2011/pyut2xml)
[](https://GitHub.com/Naereen/StrapDown.js/graphs/commit-activity)
[](https://www.python.org/)
# Introduction
This utility is an update to a [blog post](https://hsanchezii.wordpress.com/2022/04/12/manually-verify-time-machine-snapshots/) that aimed to help OS X users verify external Time Machine disks and overcome a diskutil deficiency.
# Rationale
The blog entry notes that a user can use the graphical Disk Utility in a certain order to unmount the Time Machine volume and then use the utility to "*Repair*" the volume.
Unfortunately, even after unmounting the volume OS X leaves what I think are local snapshots mounted that reference the external volume. They are of the form:
`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 on /Volumes/ . . . . . . .`
Thus, the Repair operation fails.
This utility manually unmounts those *pesky* time machine volumes
```
Usage
peskytm --help
Usage: peskytm.py [OPTIONS]
Options:
--version Show the version and exit.
--help Show this message and exit.
```
Notice this utility has no parameters. You simply execute it. Internally, `peskytm` use `sudo`, so you will be prompted for your OS X password (Don't worry the utility does nothing but pass it along). You will then see output like the following:
`peskytm`
`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-09-221954.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-16-141610.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-09-26-120444.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-10-06-172708.backup@/dev/disk7s2 unmounted`
`com.apple.TimeMachine.2021-10-14-144954.backup@/dev/disk7s2 unmounted`
Once you manually unmount this pesky volumes you can either use the graphical utility or the command line utility (CLI). An example, usage of the CLI is:
`sudo fsck_apfs -y /dev/disk7s2`
# How to Install
`pipx install peskytm`
Raw data
{
"_id": null,
"home_page": null,
"name": "peskytm",
"maintainer": null,
"docs_url": null,
"requires_python": null,
"maintainer_email": "\"Humberto A. Sanchez II\" <Humberto.A.Sanchez.II@gmail.com>",
"keywords": "OSX, time machine",
"author": null,
"author_email": "\"Humberto A. Sanchez II\" <Humberto.A.Sanchez.II@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/08/29/94a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72/peskytm-1.0.0.tar.gz",
"platform": null,
"description": "[](https://app.travis-ci.com/hasii2011/pyut2xml)\n[](https://GitHub.com/Naereen/StrapDown.js/graphs/commit-activity)\n[](https://www.python.org/)\n\n# Introduction\n\nThis utility is an update to a [blog post](https://hsanchezii.wordpress.com/2022/04/12/manually-verify-time-machine-snapshots/) that aimed to help OS X users verify external Time Machine disks and overcome a diskutil deficiency. \n\n# Rationale\n\nThe blog entry notes that a user can use the graphical Disk Utility in a certain order to unmount the Time Machine volume and then use the utility to \"*Repair*\" the volume.\n\nUnfortunately, even after unmounting the volume OS X leaves what I think are local snapshots mounted that reference the external volume. They are of the form:\n\n`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 on /Volumes/ . . . . . . .`\n\n\n\nThus, the Repair operation fails.\n\n\n\nThis utility manually unmounts those *pesky* time machine volumes\n\n\n\n```\nUsage\npeskytm --help\nUsage: peskytm.py [OPTIONS]\n\nOptions:\n --version Show the version and exit.\n --help Show this message and exit.\n\n```\n\nNotice this utility has no parameters. You simply execute it. Internally, `peskytm` use `sudo`, so you will be prompted for your OS X password (Don't worry the utility does nothing but pass it along). You will then see output like the following:\n\n\n\n`peskytm`\n\n`com.apple.TimeMachine.2021-08-31-103804.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-09-221954.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-16-141610.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-09-26-120444.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-10-06-172708.backup@/dev/disk7s2 unmounted`\n`com.apple.TimeMachine.2021-10-14-144954.backup@/dev/disk7s2 unmounted`\n\n\n\nOnce you manually unmount this pesky volumes you can either use the graphical utility or the command line utility (CLI). An example, usage of the CLI is:\n\n\n\n`sudo fsck_apfs -y /dev/disk7s2`\n\n\n\n# How to Install\n\n`pipx install peskytm`\n\n",
"bugtrack_url": null,
"license": null,
"summary": "Unmount pesky Time Machine Volumes",
"version": "1.0.0",
"project_urls": {
"Repository": "https://github.com/hasii2011/peskytm"
},
"split_keywords": [
"osx",
" time machine"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "d9373cba260a3c676b210a88b6355c0ff5f5c7714dbf43e1d694a005ad0940dd",
"md5": "e998f2fe7eb297ece33806ddb3ee23ce",
"sha256": "2bf58b027fb9a6b762874e97fbbac061e4e23a3643b906c8980d4a71ea6d28f6"
},
"downloads": -1,
"filename": "peskytm-1.0.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "e998f2fe7eb297ece33806ddb3ee23ce",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 16685,
"upload_time": "2025-07-14T17:54:46",
"upload_time_iso_8601": "2025-07-14T17:54:46.355419Z",
"url": "https://files.pythonhosted.org/packages/d9/37/3cba260a3c676b210a88b6355c0ff5f5c7714dbf43e1d694a005ad0940dd/peskytm-1.0.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "082994a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72",
"md5": "0bee5948838247fd26c917042ed197c1",
"sha256": "643c0231476e61909a45fa9893279d28d3b2f4bd69ca560b14d88b7a71360c26"
},
"downloads": -1,
"filename": "peskytm-1.0.0.tar.gz",
"has_sig": false,
"md5_digest": "0bee5948838247fd26c917042ed197c1",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 16402,
"upload_time": "2025-07-14T17:54:47",
"upload_time_iso_8601": "2025-07-14T17:54:47.590720Z",
"url": "https://files.pythonhosted.org/packages/08/29/94a84c7e78aec9a936fe1acac8b4251b1cf78e2dc6625d6e8c43af2fad72/peskytm-1.0.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-14 17:54:47",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "hasii2011",
"github_project": "peskytm",
"travis_ci": true,
"coveralls": false,
"github_actions": true,
"lcname": "peskytm"
}