Could this fix also be sent to squeeze?

Em Sat, May 21, 2011 at 08:36:19AM +0000, Debian Bug Tracking System escreveu:
> This is an automatic notification regarding your Bug report
> which was filed against the duplicity package:
> 
> #625645: duplicity: collection-status asking for passphrase
> 
> It has been closed by Alexander Zangerl <a...@debian.org>.
> 
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Alexander Zangerl 
> <a...@debian.org> by
> replying to this email.
> 
> 
> -- 
> 625645: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625645
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems

Received: (at 625645-close) by bugs.debian.org; 21 May 2011 08:32:27 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.1-bugs.debian.org_2005_01_02
        (2010-03-16) on busoni.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-13.0 required=4.0 tests=BAYES_00,FROMDEVELOPER,
        FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,IMPRONONCABLE_2,PGPSIGNATURE 
autolearn=ham
        version=3.3.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 39; hammy, 151; neutral, 77; spammy,
        0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK,
        0.000-+--H*rp:D*ftp-master.debian.org, 0.000-+--HX-DAK:process-upload,
        0.000-+--H*MI:franck, 0.000-+--H*RU:128.148.34.3
Return-path: <envel...@ftp-master.debian.org>
Received: from franck.debian.org ([128.148.34.3])
        from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP 
CA,CN=franck.debian.org,EMAIL=hostmas...@franck.debian.org (verified)
        by busoni.debian.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32)
        (Exim 4.72)
        (envelope-from <envel...@ftp-master.debian.org>)
        id 1QNhbn-0006eI-5o
        for 625645-cl...@bugs.debian.org; Sat, 21 May 2011 08:32:27 +0000
Received: from dak by franck.debian.org with local (Exim 4.72)
        (envelope-from <envel...@ftp-master.debian.org>)
        id 1QNhbl-0003SF-Mw; Sat, 21 May 2011 08:32:25 +0000
Date: Sat, 21 May 2011 08:32:25 +0000
Message-Id: <e1qnhbl-0003sf...@franck.debian.org>
From: Alexander Zangerl <a...@debian.org>
To: 625645-cl...@bugs.debian.org
X-DAK: dak process-upload
X-Debian: DAK
X-Debian-Package: duplicity
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Subject: Bug#625645: fixed in duplicity 0.6.13-2
Sender: Archive Administrator <d...@franck.debian.org>
> 
> Source: duplicity
> Source-Version: 0.6.13-2
> 
> We believe that the bug you reported is fixed in the latest version of
> duplicity, which is due to be installed in the Debian FTP archive:
> 
> duplicity_0.6.13-2.diff.gz
>   to main/d/duplicity/duplicity_0.6.13-2.diff.gz
> duplicity_0.6.13-2.dsc
>   to main/d/duplicity/duplicity_0.6.13-2.dsc
> duplicity_0.6.13-2_i386.deb
>   to main/d/duplicity/duplicity_0.6.13-2_i386.deb
> 
> 
> 
> A summary of the changes between this version and the previous one is
> attached.
> 
> Thank you for reporting the bug, which will now be closed.  If you
> have further comments please address them to 625...@bugs.debian.org,
> and the maintainer will reopen the bug report if appropriate.
> 
> Debian distribution maintenance software
> pp.
> Alexander Zangerl <a...@debian.org> (supplier of updated duplicity package)
> 
> (This message was generated automatically at their request; if you
> believe that there is a problem with it please contact the archive
> administrators by mailing ftpmas...@debian.org)
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Format: 1.8
> Date: Sat, 21 May 2011 17:46:28 +1000
> Source: duplicity
> Binary: duplicity
> Architecture: source i386
> Version: 0.6.13-2
> Distribution: unstable
> Urgency: low
> Maintainer: Alexander Zangerl <a...@debian.org>
> Changed-By: Alexander Zangerl <a...@debian.org>
> Description: 
>  duplicity  - encrypted bandwidth-efficient backup
> Closes: 625645
> Changes: 
>  duplicity (0.6.13-2) unstable; urgency=low
>  .
>    * applied fix to allow collectionstatus op without access to key
>      (closes: #625645)
> Checksums-Sha1: 
>  2b71435af1fc2d2c8f45773405265580a1887dc3 1033 duplicity_0.6.13-2.dsc
>  0775a43605ecb9ff88c80e63c09c0672d82ff318 13831 duplicity_0.6.13-2.diff.gz
>  b4dde1d29dc10b22e4bda2cb87b8d2aae7c72de9 197164 duplicity_0.6.13-2_i386.deb
> Checksums-Sha256: 
>  8ef7e0cd1ca7297e78a8823d74c9da2b2c0d8238654440c491ddad1356247a3d 1033 
> duplicity_0.6.13-2.dsc
>  ae87d416dbf7bcae2668701d34cce3c9784cc9c8c53ae4a436bef7133b035ca5 13831 
> duplicity_0.6.13-2.diff.gz
>  9282aa145a5307ecb728d0df91c1d23dce1dec6ac91b58bd72e96b382c06d10e 197164 
> duplicity_0.6.13-2_i386.deb
> Files: 
>  d98d428a68e72c8cced6251601f2b070 1033 utils optional duplicity_0.6.13-2.dsc
>  78ba6c768a249d712527b3a2682f53a7 13831 utils optional 
> duplicity_0.6.13-2.diff.gz
>  2f9eca05915bcf76bb4254f303bb99ca 197164 utils optional 
> duplicity_0.6.13-2_i386.deb
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> 
> iEYEARECAAYFAk3XbeAACgkQpy/2bEK9ZF221ACfWe/maDe379DV0rBxUzsC2Dtt
> SHkAn2T6fPEOPNPTQa3AcHuXOz8kklEp
> =j/al
> -----END PGP SIGNATURE-----
> 
> 

Received: (at submit) by bugs.debian.org; 4 May 2011 19:39:37 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.1-bugs.debian.org_2005_01_02
        (2010-03-16) on busoni.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-11.6 required=4.0 tests=BAYES_00,FOURLA,HAS_PACKAGE,
        IMPRONONCABLE_2,MURPHY_DRUGS_REL8,SPF_HELO_PASS,SPF_NEUTRAL,URIBL_CNKR,
        XMAILER_REPORTBUG,X_DEBBUGS_CC autolearn=ham
        version=3.3.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 35; hammy, 151; neutral, 251; spammy,
        0. spammytokens: hammytokens:0.000-+--H*M:reportbug, 
0.000-+--H*MI:reportbug,
        0.000-+--H*x:reportbug, 0.000-+--H*UA:reportbug, 0.000-+--H*x:4.12.6
Return-path: <rha...@riseup.net>
Received: from fluxo.info ([189.19.241.77] helo=ratten.fluxo.info)
        by busoni.debian.org with esmtp (Exim 4.72)
        (envelope-from <rha...@riseup.net>)
        id 1QHhv7-0002Y5-0d
        for sub...@bugs.debian.org; Wed, 04 May 2011 19:39:37 +0000
Content-Type: multipart/mixed; boundary="===============8881932218237544044=="
MIME-Version: 1.0
From: rhatto <rha...@riseup.net>
To: Debian Bug Tracking System <sub...@bugs.debian.org>
Subject: duplicity: collection-status asking for passphrase
Message-ID: <20110504193929.25799.22543.report...@ratten.fluxo.info>
X-Mailer: reportbug 4.12.6
Date: Wed, 04 May 2011 16:39:29 -0300
X-Debbugs-Cc: rha...@riseup.net
Delivered-To: sub...@bugs.debian.org
> 
> Package: duplicity
> Version: 0.6.08b-1+b1
> Severity: important
> Tags: patch
> 
> 
> At lenny's duplicity (0.4.11-2), it was possible to run the following command 
> in the remote host
> without having the GPG keys or password:
> 
>   duplicity collection-status 
> file:///var/backups/remote/remote-host.example.org/duplicity/
> 
> After upgrading to squeezy (duplicity 0.6.08b-1), I get the following prompt 
> instead of the
> regular collection-status message:
> 
>   A sincronizar os meta-dados remotos com a cache local...
>   GnuPG passphrase: 
> 
> When running on a non-interactive script[1][2] I get the following error:
> 
>   A sincronizar os meta-dados remotos com a cache local...
>   /usr/lib/python2.6/getpass.py:83: GetPassWarning: Can not control echo on 
> the terminal.
>     passwd = fallback_getpass(prompt, stream)
>   Warning: Password input may be echoed.
>   GnuPG passphrase: Traceback (most recent call last):
>     File "/usr/bin/duplicity", line 1251, in <module>
>       with_tempdir(main)
>     File "/usr/bin/duplicity", line 1244, in with_tempdir
>       fn()
>     File "/usr/bin/duplicity", line 1145, in main
>       sync_archive()
>     File "/usr/bin/duplicity", line 955, in sync_archive
>       globals.gpg_profile.passphrase = get_passphrase(1, "sync")
>     File "/usr/bin/duplicity", line 128, in get_passphrase
>       pass1 = getpass.getpass("GnuPG passphrase: ")
>     File "/usr/lib/python2.6/getpass.py", line 83, in unix_getpass
>       passwd = fallback_getpass(prompt, stream)
>     File "/usr/lib/python2.6/getpass.py", line 118, in fallback_getpass
>       return _raw_input(prompt, stream)
>     File "/usr/lib/python2.6/getpass.py", line 135, in _raw_input
>       raise EOFError
>   EOFError
> 
> I can't find in upstream CHANGELOG[3] any reference about changed 
> collection-status behavior but
> I found that commenting the sync_archive() call at main() the problem was 
> solved. Therefore I created
> the following patch:
> 
> --- duplicity-0.6.08b/duplicity 2011-05-04 16:25:08.000000000 -0300
> +++ duplicity-0.6.08b.orig/duplicity  2010-03-11 22:39:07.000000000 -0300
> @@ -1130,8 +1130,7 @@
>      check_resources(action)
>  
>      # check archive synch with remote, fix if needed
> -    if action not in ["collection-status"]:
> -      sync_archive()
> +    sync_archive()
>  
>      # get current collection status
>      col_stats = collections.CollectionsStatus(globals.backend,
> 
> Having the ability to check the backup sets in the remote host without having 
> the backup keys
> is an important feature to help backup auditing.
> 
> An issue was issued upstream[4].
> 
> [1] 
> https://git.sarava.org/?p=puppet-backup.git;a=blob;f=templates/rsync-check.sh.erb;h=879faaf59baee3da996f10659e59bbe2efccb683;hb=HEAD
> [2] 
> https://git.sarava.org/?p=puppet-backup.git;a=blob;f=templates/rdiff-check.sh.erb;h=a2052ff75f1f1421aff98d0f1eab6c1f519d0d4b;hb=HEAD
> [3] http://duplicity.nongnu.org/CHANGELOG
> [4] https://bugs.launchpad.net/duplicity/+bug/777377
> 
> -- System Information:
> Debian Release: 6.0.1
>   APT prefers stable
>   APT policy: (990, 'stable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 2.6.32-5-vserver-amd64 (SMP w/1 CPU core)
> Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) (ignored: 
> LC_ALL set to pt_BR.UTF-8)
> Shell: /bin/sh linked to /bin/bash
> 
> Versions of packages duplicity depends on:
> ii  gnupg                   1.4.10-4         GNU privacy guard - a free PGP 
> rep
> ii  libc6                   2.11.2-10        Embedded GNU C Library: Shared 
> lib
> ii  librsync1               0.9.7-7          rsync remote-delta algorithm 
> libra
> ii  python                  2.6.6-3+squeeze6 interactive high-level 
> object-orie
> ii  python-central          0.6.16+nmu1      register and build utility for 
> Pyt
> ii  python-pexpect          2.3-1            Python module for automating 
> inter
> 
> duplicity recommends no packages.
> 
> Versions of packages duplicity suggests:
> pn  ncftp                         <none>     (no description available)
> pn  python-boto                   <none>     (no description available)
> 
> -- no debconf information

> diff -Naur duplicity-0.6.13.orig/duplicity duplicity-0.6.13/duplicity
> --- duplicity-0.6.13.orig/duplicity   2011-04-02 14:48:22.000000000 -0300
> +++ duplicity-0.6.13/duplicity        2011-05-04 16:28:33.000000000 -0300
> @@ -1141,7 +1141,8 @@
>      check_resources(action)
>  
>      # check archive synch with remote, fix if needed
> -    sync_archive()
> +    if action not in ["collection-status"]:
> +      sync_archive()    
>  
>      # get current collection status
>      col_stats = collections.CollectionsStatus(globals.backend,

-- 
rhatto at riseup.net
pubkey 64E39FCA / keys.indymedia.org

Attachment: signature.asc
Description: Digital signature

Reply via email to