Your message dated Wed, 09 Apr 2014 18:48:28 +0000
with message-id <[email protected]>
and subject line Bug#743190: fixed in duply 1.7.3-1
has caused the Debian Bug report #743190,
regarding duply no longer allows restoration without gpg passphrase in conf file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
743190: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743190
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duply
Version: 1.6.0-1
Severity: normal

When I first tested duply, I was able to give a GPG key Id in the conf
file without giving the passphrase, which I had to enter manualy for
restoration.

However it does not work anymore : here is what I now get :

duply edavid fetch work.pub work.pub
Start duply v1.6.0, time is 2014-03-31 12:47:49.
Using profile '/secure/home/edavid/.duply/edavid'.
Using installed duplicity version 0.6.23, python 2.7.6, gpg 1.4.16 (Home: 
~/.gnupg), awk 'GNU Awk 4.0.1', bash '4.3.0(1)-release (x86_64-pc-linux-gnu)'.
Signing disabled per configuration.
Autoenable use of gpg-agent. GPG_PW or GPG_PW_SIGN (enc != sign key) not set.
Test - En/Decryption skipped. (Testing disabled)

--- Start running command FETCH at 12:47:49.776 ---
GPGError: GPG Failed, see log below:
===== Begin GnuPG log =====
gpg: gpg-agent is not available in this session
gpg: can't query passphrase in batch mode
gpg: Invalid passphrase; please try again ...
gpg: can't query passphrase in batch mode
gpg: Invalid passphrase; please try again ...
gpg: can't query passphrase in batch mode
gpg: encrypted with 4096-bit RSA key, ID 0xB5A4F21D6CB95BE4, created 2013-09-23
"Erwan David <[email protected]>"
gpg: public key decryption failed: bad passphrase
gpg: decryption failed: secret key not available
===== End GnuPG log =====

12:47:55.629 Task 'FETCH' failed with exit code '31'.
--- Finished state FAILED 'code 31' at 12:47:55.629 - Runtime 00:00:05.852 ---


What should I do in order to not be obliged to store the passphrase in
a config file ?


-- System Information:
Debian Release: jessie/sid
  APT prefers testing-proposed-updates
  APT policy: (900, 'testing-proposed-updates'), (900, 'testing'), (800, 
'stable'), (500, 'proposed-updates'), (400, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.13-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages duply depends on:
ii  duplicity  0.6.23-1
ii  gnupg      1.4.16-1.1

duply recommends no packages.

Versions of packages duply suggests:
ii  openssh-client  1:6.5p1-6

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: duply
Source-Version: 1.7.3-1

We believe that the bug you reported is fixed in the latest version of
duply, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn <[email protected]> (supplier of updated duply package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 09 Apr 2014 19:50:49 +0200
Source: duply
Binary: duply
Architecture: source all
Version: 1.7.3-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn <[email protected]>
Changed-By: Joachim Wiedorn <[email protected]>
Description: 
 duply      - easy to use frontend to the duplicity backup system
Closes: 737024 743190
Changes: 
 duply (1.7.3-1) unstable; urgency=medium
 .
   * New upstream release with bugfixes:
     - Allow again restoration without gpg passphrase. Closes: #743190
     - Support for long gpg keyIDs. Closes: #737024
   * Full update of all patches.
   * Update manpage debian/man/duply.1.
Checksums-Sha1: 
 9deea58584a0872cfd68b3dc87d47474b070990f 1136 duply_1.7.3-1.dsc
 f9111e1cfee4cd63a38ff153735d35ca3956aa21 34684 duply_1.7.3.orig.tar.gz
 04ffe9e7b796662aae99896bed4b2af5913127a7 17320 duply_1.7.3-1.debian.tar.xz
 2892d1e4ec7c4ab63ff10bd87a8dd34aa8dc1979 33736 duply_1.7.3-1_all.deb
Checksums-Sha256: 
 7a90ecefd76a2687c2566c80efa28286edd6ea489e7f83268d8cdcc0ebda648b 1136 
duply_1.7.3-1.dsc
 e0ae298b06125bb6665a3f4822828d36e9f56c93755b45e2240fd1643e7f05d3 34684 
duply_1.7.3.orig.tar.gz
 14bba8ebd4a59b3d41550b9cfe876b807ea424189e5f0f1292805012f5184a83 17320 
duply_1.7.3-1.debian.tar.xz
 23a27d2740e12c2436970d0fffde3bb57e79a79dd3ce521a61ef4ccbd297c0d0 33736 
duply_1.7.3-1_all.deb
Files: 
 6770db11bd2dc51b57287a33a371f4bb 1136 utils optional duply_1.7.3-1.dsc
 139e36c3ee35d8bca15b6aa9c7f8939b 34684 utils optional duply_1.7.3.orig.tar.gz
 632c213ec16c893cc16d651594b16bec 17320 utils optional 
duply_1.7.3-1.debian.tar.xz
 1cd75b6e7408696949e6e65aac16fca5 33736 utils optional duply_1.7.3-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlNFk9oACgkQSiJUZB/hsIswegCfWxSPHLgakNdFx36dhdCf2KzM
RaAAoLjO9x4jUsSLWGwfeHoa1D3HOjPn
=Xf09
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to