Your message dated Mon, 25 Jul 2011 23:32:18 +0000
with message-id <[email protected]>
and subject line Bug#601584: fixed in duplicity 0.6.14-1
has caused the Debian Bug report #601584,
regarding duplicity should fail gracefully on unreadable non-standard files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
601584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601584
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duplicity
Version: 0.6.08b-1+b1
Severity: serious

duplicity chokes on me with the traceback below and then continues
to spin in a FUTEX_WAIT_PRIVATE for days and days.

Traceback (most recent call last):
  File "/usr/bin/duplicity", line 1251, in <module>
    with_tempdir(main)
  File "/usr/bin/duplicity", line 1244, in with_tempdir
    fn()
  File "/usr/bin/duplicity", line 1222, in main
    full_backup(col_stats)
  File "/usr/bin/duplicity", line 416, in full_backup
    globals.backend)
  File "/usr/bin/duplicity", line 294, in write_multivol
    globals.gpg_profile, globals.volsize)
  File "/usr/lib/python2.6/dist-packages/duplicity/gpg.py", line 279, in 
GPGWriteFile
    data = block_iter.next(min(block_size, bytes_to_go)).data
  File "/usr/lib/python2.6/dist-packages/duplicity/diffdir.py", line 505, in 
next
    result = self.process(self.input_iter.next(), size)
  File "/usr/lib/python2.6/dist-packages/duplicity/diffdir.py", line 631, in 
process
    data, last_block = self.get_data_block(fp, size - 512)
  File "/usr/lib/python2.6/dist-packages/duplicity/diffdir.py", line 658, in 
get_data_block
    buf = fp.read(read_size)
  File "/usr/lib/python2.6/dist-packages/duplicity/diffdir.py", line 415, in 
read
    buf = self.infile.read(length)
  File "/usr/lib/python2.6/dist-packages/duplicity/diffdir.py", line 384, in 
read
    buf = self.infile.read(length)
IOError: [Errno 22] Invalid argument

It does this even if --no-encryption is given.




--- End Message ---
--- Begin Message ---
Source: duplicity
Source-Version: 0.6.14-1

We believe that the bug you reported is fixed in the latest version of
duplicity, which is due to be installed in the Debian FTP archive:

duplicity_0.6.14-1.diff.gz
  to main/d/duplicity/duplicity_0.6.14-1.diff.gz
duplicity_0.6.14-1.dsc
  to main/d/duplicity/duplicity_0.6.14-1.dsc
duplicity_0.6.14-1_i386.deb
  to main/d/duplicity/duplicity_0.6.14-1_i386.deb
duplicity_0.6.14.orig.tar.gz
  to main/d/duplicity/duplicity_0.6.14.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexander Zangerl <[email protected]> (supplier of updated duplicity package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 25 Jul 2011 18:38:04 +1000
Source: duplicity
Binary: duplicity
Architecture: source i386
Version: 0.6.14-1
Distribution: unstable
Urgency: low
Maintainer: Alexander Zangerl <[email protected]>
Changed-By: Alexander Zangerl <[email protected]>
Description: 
 duplicity  - encrypted bandwidth-efficient backup
Closes: 601584 635037
Changes: 
 duplicity (0.6.14-1) unstable; urgency=low
 .
   * New upstream release (closes: #635037, #601584)
Checksums-Sha1: 
 d6aa8776a333374fe164cd427cd169676e68b156 1033 duplicity_0.6.14-1.dsc
 2dc3af9e668f15fdcac63cc15214cb440faf5cf1 303585 duplicity_0.6.14.orig.tar.gz
 06661a2a0b431f0c7d3faa599df737146dc6c013 12819 duplicity_0.6.14-1.diff.gz
 6914e6b94e3be7bc0b7e1e6f425c68647c80de50 202138 duplicity_0.6.14-1_i386.deb
Checksums-Sha256: 
 017eead60c306fa9512614ac2ace5d04385fd3292f9fc065db8dc215a855b9a5 1033 
duplicity_0.6.14-1.dsc
 c7f142160994d91dabe835f81e6f180eaae76adc8ad504d57642fc064fec0fc0 303585 
duplicity_0.6.14.orig.tar.gz
 476068461f39ea55dd7d13c14a0549c462906fe258879268cc3b266dd0f40ef5 12819 
duplicity_0.6.14-1.diff.gz
 fc63443ec512efd087d93df4fe2f56e18238b503e7b31b41576fe4885e9f7cf5 202138 
duplicity_0.6.14-1_i386.deb
Files: 
 de89695babcefd981f6d749b8a2db42b 1033 utils optional duplicity_0.6.14-1.dsc
 09747eb1430a3f16888a661e5acbf28d 303585 utils optional 
duplicity_0.6.14.orig.tar.gz
 ed5f3373baa2923e745fc7bb7f57f151 12819 utils optional 
duplicity_0.6.14-1.diff.gz
 24d89199e8ea671c9c9c88eadf743306 202138 utils optional 
duplicity_0.6.14-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk4tNJEACgkQpy/2bEK9ZF2dOwCggmCwSQeYPFdmCQ/IMKGL2DeW
ol0An05RVTsuKl1RyRfNwQy45npj6FPi
=Rjh1
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to