Your message dated Sat, 01 Oct 2011 06:17:10 +0000
with message-id <[email protected]>
and subject line Bug#643846: fixed in duplicity 0.6.15-1
has caused the Debian Bug report #643846,
regarding duplicity: Backups prompting for passphrase
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
643846: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643846
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duplicity
Version: 0.6.14-1
Severity: important
Dear Maintainer,
A recent routine 'apt-get upgrade' to my Debian Wheezy installed a new version
of duplicity (0.6.14-1). This upgrade seems to have introduced a requirement
to supply a passphrase during backup jobs. Previously I could perform a backup
as a user with access to just the public GnuPG key and no passphrase. The
secret key and passphrase only being required during restore activities.
Here's an example of the script I'm running to trigger the backup:-
#!/bin/bash
DUPLICITY='/usr/bin/duplicity'
DEST='/var/local/backup/duplicity/etc'
SOURCE='/etc'
PGPKEY='12341234'
$DUPLICITY full \
--encrypt-key=$PGPKEY \
$SOURCE \
file://${DEST}
Regards
Steve
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.39.1
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages duplicity depends on:
ii libc6 2.13-21
ii librsync1 0.9.7-8
ii python 2.6.7-3
ii python-gnupginterface 0.3.2-9.1
ii python-pexpect 2.3-1
ii python2.6 2.6.7-3
duplicity recommends no packages.
Versions of packages duplicity suggests:
pn ncftp <none>
pn python-boto <none>
pn rsync 3.0.8-1
pn ssh <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: duplicity
Source-Version: 0.6.15-1
We believe that the bug you reported is fixed in the latest version of
duplicity, which is due to be installed in the Debian FTP archive:
duplicity_0.6.15-1.diff.gz
to main/d/duplicity/duplicity_0.6.15-1.diff.gz
duplicity_0.6.15-1.dsc
to main/d/duplicity/duplicity_0.6.15-1.dsc
duplicity_0.6.15-1_i386.deb
to main/d/duplicity/duplicity_0.6.15-1_i386.deb
duplicity_0.6.15.orig.tar.gz
to main/d/duplicity/duplicity_0.6.15.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alexander Zangerl <[email protected]> (supplier of updated duplicity package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 01 Oct 2011 15:26:27 +1000
Source: duplicity
Binary: duplicity
Architecture: source i386
Version: 0.6.15-1
Distribution: unstable
Urgency: high
Maintainer: Alexander Zangerl <[email protected]>
Changed-By: Alexander Zangerl <[email protected]>
Description:
duplicity - encrypted bandwidth-efficient backup
Closes: 643846
Changes:
duplicity (0.6.15-1) unstable; urgency=high
.
* New upstream release
* repaired patch for #572792 which had been misapplied/broken
in 0.6.14 (closes: #643846)
Checksums-Sha1:
cdbbd8b169270ef3e556fbb63aab3e4703da1130 1033 duplicity_0.6.15-1.dsc
716801fffa349276e7b444de7cd5f248b3c02113 304916 duplicity_0.6.15.orig.tar.gz
e8007e3f2123d8533d9f9c110446cac7df7fd386 13452 duplicity_0.6.15-1.diff.gz
17b8679b5f9e81b69bf1a9952fd3e37d9d8e17a1 206816 duplicity_0.6.15-1_i386.deb
Checksums-Sha256:
74421e7a396c3986001c228952b79bd5df462ee8c45070314d42dc4aa1a33c48 1033
duplicity_0.6.15-1.dsc
69f30388334b84db43ed4eb7838896a73cf53d62718c692a88ab3d3963e1dfad 304916
duplicity_0.6.15.orig.tar.gz
b4d27fbefd066d2c196f6258a000f1fa99da8ec5b891d777d08a4c6a6939e71a 13452
duplicity_0.6.15-1.diff.gz
539ceb5682f1f5f3100d70d570e26894eba2a9370af4abe03880b3ee0a6c5f84 206816
duplicity_0.6.15-1_i386.deb
Files:
ff676ccdcf6a509cfe6ddde7745af779 1033 utils optional duplicity_0.6.15-1.dsc
88f3c990f41fde86cd7d5af5a1bc7b81 304916 utils optional
duplicity_0.6.15.orig.tar.gz
9f946153a258a61684b81ca0e84122f0 13452 utils optional
duplicity_0.6.15-1.diff.gz
e48829f42eb639a5de8e73c7071b6f6d 206816 utils optional
duplicity_0.6.15-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk6Gp38ACgkQpy/2bEK9ZF1uBQCdGSCmvZQ5MQDJyA5yfjVlCjhQ
450An1Skb4uVVNDsyCtLrvZPfbyPOoZc
=E0lU
-----END PGP SIGNATURE-----
--- End Message ---