Could this fix also be sent to squeeze? Em Sat, May 21, 2011 at 08:36:19AM +0000, Debian Bug Tracking System escreveu: > This is an automatic notification regarding your Bug report > which was filed against the duplicity package: > > #625645: duplicity: collection-status asking for passphrase > > It has been closed by Alexander Zangerl <a...@debian.org>. > > Their explanation is attached below along with your original report. > If this explanation is unsatisfactory and you have not received a > better one in a separate message then please contact Alexander Zangerl > <a...@debian.org> by > replying to this email. > > > -- > 625645: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625645 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems
Received: (at 625645-close) by bugs.debian.org; 21 May 2011 08:32:27 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.1-bugs.debian.org_2005_01_02 (2010-03-16) on busoni.debian.org X-Spam-Level: X-Spam-Status: No, score=-13.0 required=4.0 tests=BAYES_00,FROMDEVELOPER, FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,IMPRONONCABLE_2,PGPSIGNATURE autolearn=ham version=3.3.1-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 39; hammy, 151; neutral, 77; spammy, 0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK, 0.000-+--H*rp:D*ftp-master.debian.org, 0.000-+--HX-DAK:process-upload, 0.000-+--H*MI:franck, 0.000-+--H*RU:128.148.34.3 Return-path: <envel...@ftp-master.debian.org> Received: from franck.debian.org ([128.148.34.3]) from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP CA,CN=franck.debian.org,EMAIL=hostmas...@franck.debian.org (verified) by busoni.debian.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <envel...@ftp-master.debian.org>) id 1QNhbn-0006eI-5o for 625645-cl...@bugs.debian.org; Sat, 21 May 2011 08:32:27 +0000 Received: from dak by franck.debian.org with local (Exim 4.72) (envelope-from <envel...@ftp-master.debian.org>) id 1QNhbl-0003SF-Mw; Sat, 21 May 2011 08:32:25 +0000 Date: Sat, 21 May 2011 08:32:25 +0000 Message-Id: <e1qnhbl-0003sf...@franck.debian.org> From: Alexander Zangerl <a...@debian.org> To: 625645-cl...@bugs.debian.org X-DAK: dak process-upload X-Debian: DAK X-Debian-Package: duplicity MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Subject: Bug#625645: fixed in duplicity 0.6.13-2 Sender: Archive Administrator <d...@franck.debian.org> > > Source: duplicity > Source-Version: 0.6.13-2 > > We believe that the bug you reported is fixed in the latest version of > duplicity, which is due to be installed in the Debian FTP archive: > > duplicity_0.6.13-2.diff.gz > to main/d/duplicity/duplicity_0.6.13-2.diff.gz > duplicity_0.6.13-2.dsc > to main/d/duplicity/duplicity_0.6.13-2.dsc > duplicity_0.6.13-2_i386.deb > to main/d/duplicity/duplicity_0.6.13-2_i386.deb > > > > A summary of the changes between this version and the previous one is > attached. > > Thank you for reporting the bug, which will now be closed. If you > have further comments please address them to 625...@bugs.debian.org, > and the maintainer will reopen the bug report if appropriate. > > Debian distribution maintenance software > pp. > Alexander Zangerl <a...@debian.org> (supplier of updated duplicity package) > > (This message was generated automatically at their request; if you > believe that there is a problem with it please contact the archive > administrators by mailing ftpmas...@debian.org) > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Format: 1.8 > Date: Sat, 21 May 2011 17:46:28 +1000 > Source: duplicity > Binary: duplicity > Architecture: source i386 > Version: 0.6.13-2 > Distribution: unstable > Urgency: low > Maintainer: Alexander Zangerl <a...@debian.org> > Changed-By: Alexander Zangerl <a...@debian.org> > Description: > duplicity - encrypted bandwidth-efficient backup > Closes: 625645 > Changes: > duplicity (0.6.13-2) unstable; urgency=low > . > * applied fix to allow collectionstatus op without access to key > (closes: #625645) > Checksums-Sha1: > 2b71435af1fc2d2c8f45773405265580a1887dc3 1033 duplicity_0.6.13-2.dsc > 0775a43605ecb9ff88c80e63c09c0672d82ff318 13831 duplicity_0.6.13-2.diff.gz > b4dde1d29dc10b22e4bda2cb87b8d2aae7c72de9 197164 duplicity_0.6.13-2_i386.deb > Checksums-Sha256: > 8ef7e0cd1ca7297e78a8823d74c9da2b2c0d8238654440c491ddad1356247a3d 1033 > duplicity_0.6.13-2.dsc > ae87d416dbf7bcae2668701d34cce3c9784cc9c8c53ae4a436bef7133b035ca5 13831 > duplicity_0.6.13-2.diff.gz > 9282aa145a5307ecb728d0df91c1d23dce1dec6ac91b58bd72e96b382c06d10e 197164 > duplicity_0.6.13-2_i386.deb > Files: > d98d428a68e72c8cced6251601f2b070 1033 utils optional duplicity_0.6.13-2.dsc > 78ba6c768a249d712527b3a2682f53a7 13831 utils optional > duplicity_0.6.13-2.diff.gz > 2f9eca05915bcf76bb4254f303bb99ca 197164 utils optional > duplicity_0.6.13-2_i386.deb > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.10 (GNU/Linux) > > iEYEARECAAYFAk3XbeAACgkQpy/2bEK9ZF221ACfWe/maDe379DV0rBxUzsC2Dtt > SHkAn2T6fPEOPNPTQa3AcHuXOz8kklEp > =j/al > -----END PGP SIGNATURE----- > > Received: (at submit) by bugs.debian.org; 4 May 2011 19:39:37 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.1-bugs.debian.org_2005_01_02 (2010-03-16) on busoni.debian.org X-Spam-Level: X-Spam-Status: No, score=-11.6 required=4.0 tests=BAYES_00,FOURLA,HAS_PACKAGE, IMPRONONCABLE_2,MURPHY_DRUGS_REL8,SPF_HELO_PASS,SPF_NEUTRAL,URIBL_CNKR, XMAILER_REPORTBUG,X_DEBBUGS_CC autolearn=ham version=3.3.1-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 35; hammy, 151; neutral, 251; spammy, 0. spammytokens: hammytokens:0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug, 0.000-+--H*x:reportbug, 0.000-+--H*UA:reportbug, 0.000-+--H*x:4.12.6 Return-path: <rha...@riseup.net> Received: from fluxo.info ([189.19.241.77] helo=ratten.fluxo.info) by busoni.debian.org with esmtp (Exim 4.72) (envelope-from <rha...@riseup.net>) id 1QHhv7-0002Y5-0d for sub...@bugs.debian.org; Wed, 04 May 2011 19:39:37 +0000 Content-Type: multipart/mixed; boundary="===============8881932218237544044==" MIME-Version: 1.0 From: rhatto <rha...@riseup.net> To: Debian Bug Tracking System <sub...@bugs.debian.org> Subject: duplicity: collection-status asking for passphrase Message-ID: <20110504193929.25799.22543.report...@ratten.fluxo.info> X-Mailer: reportbug 4.12.6 Date: Wed, 04 May 2011 16:39:29 -0300 X-Debbugs-Cc: rha...@riseup.net Delivered-To: sub...@bugs.debian.org > > Package: duplicity > Version: 0.6.08b-1+b1 > Severity: important > Tags: patch > > > At lenny's duplicity (0.4.11-2), it was possible to run the following command > in the remote host > without having the GPG keys or password: > > duplicity collection-status > file:///var/backups/remote/remote-host.example.org/duplicity/ > > After upgrading to squeezy (duplicity 0.6.08b-1), I get the following prompt > instead of the > regular collection-status message: > > A sincronizar os meta-dados remotos com a cache local... > GnuPG passphrase: > > When running on a non-interactive script[1][2] I get the following error: > > A sincronizar os meta-dados remotos com a cache local... > /usr/lib/python2.6/getpass.py:83: GetPassWarning: Can not control echo on > the terminal. > passwd = fallback_getpass(prompt, stream) > Warning: Password input may be echoed. > GnuPG passphrase: Traceback (most recent call last): > File "/usr/bin/duplicity", line 1251, in <module> > with_tempdir(main) > File "/usr/bin/duplicity", line 1244, in with_tempdir > fn() > File "/usr/bin/duplicity", line 1145, in main > sync_archive() > File "/usr/bin/duplicity", line 955, in sync_archive > globals.gpg_profile.passphrase = get_passphrase(1, "sync") > File "/usr/bin/duplicity", line 128, in get_passphrase > pass1 = getpass.getpass("GnuPG passphrase: ") > File "/usr/lib/python2.6/getpass.py", line 83, in unix_getpass > passwd = fallback_getpass(prompt, stream) > File "/usr/lib/python2.6/getpass.py", line 118, in fallback_getpass > return _raw_input(prompt, stream) > File "/usr/lib/python2.6/getpass.py", line 135, in _raw_input > raise EOFError > EOFError > > I can't find in upstream CHANGELOG[3] any reference about changed > collection-status behavior but > I found that commenting the sync_archive() call at main() the problem was > solved. Therefore I created > the following patch: > > --- duplicity-0.6.08b/duplicity 2011-05-04 16:25:08.000000000 -0300 > +++ duplicity-0.6.08b.orig/duplicity 2010-03-11 22:39:07.000000000 -0300 > @@ -1130,8 +1130,7 @@ > check_resources(action) > > # check archive synch with remote, fix if needed > - if action not in ["collection-status"]: > - sync_archive() > + sync_archive() > > # get current collection status > col_stats = collections.CollectionsStatus(globals.backend, > > Having the ability to check the backup sets in the remote host without having > the backup keys > is an important feature to help backup auditing. > > An issue was issued upstream[4]. > > [1] > https://git.sarava.org/?p=puppet-backup.git;a=blob;f=templates/rsync-check.sh.erb;h=879faaf59baee3da996f10659e59bbe2efccb683;hb=HEAD > [2] > https://git.sarava.org/?p=puppet-backup.git;a=blob;f=templates/rdiff-check.sh.erb;h=a2052ff75f1f1421aff98d0f1eab6c1f519d0d4b;hb=HEAD > [3] http://duplicity.nongnu.org/CHANGELOG > [4] https://bugs.launchpad.net/duplicity/+bug/777377 > > -- System Information: > Debian Release: 6.0.1 > APT prefers stable > APT policy: (990, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 2.6.32-5-vserver-amd64 (SMP w/1 CPU core) > Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) (ignored: > LC_ALL set to pt_BR.UTF-8) > Shell: /bin/sh linked to /bin/bash > > Versions of packages duplicity depends on: > ii gnupg 1.4.10-4 GNU privacy guard - a free PGP > rep > ii libc6 2.11.2-10 Embedded GNU C Library: Shared > lib > ii librsync1 0.9.7-7 rsync remote-delta algorithm > libra > ii python 2.6.6-3+squeeze6 interactive high-level > object-orie > ii python-central 0.6.16+nmu1 register and build utility for > Pyt > ii python-pexpect 2.3-1 Python module for automating > inter > > duplicity recommends no packages. > > Versions of packages duplicity suggests: > pn ncftp <none> (no description available) > pn python-boto <none> (no description available) > > -- no debconf information > diff -Naur duplicity-0.6.13.orig/duplicity duplicity-0.6.13/duplicity > --- duplicity-0.6.13.orig/duplicity 2011-04-02 14:48:22.000000000 -0300 > +++ duplicity-0.6.13/duplicity 2011-05-04 16:28:33.000000000 -0300 > @@ -1141,7 +1141,8 @@ > check_resources(action) > > # check archive synch with remote, fix if needed > - sync_archive() > + if action not in ["collection-status"]: > + sync_archive() > > # get current collection status > col_stats = collections.CollectionsStatus(globals.backend, -- rhatto at riseup.net pubkey 64E39FCA / keys.indymedia.org
signature.asc
Description: Digital signature