This mail is an automated notification from the bugs tracker
of the project: xtla.el.
/**************************************************************************/
[bugs #833] Latest Modifications:
Changes by:
Matthieu MOY <[EMAIL PROTECTED]>
'Date:
Fri 10/01/2004 at 20:16 (Europe/Paris)
What | Removed | Added
---------------------------------------------------------------------------
Assigned to | None | moy
------------------ Additional Follow-up Comments ----------------------------
I'll take care of this.
What is precisely the list of problematic commands ?
commit
cacherev
import
tag
?
/**************************************************************************/
[bugs #833] Full Item Snapshot:
URL: <http://gna.org/bugs/?func=detailitem&item_id=833>
Project: xtla.el
Submitted by: Matthieu MOY
On: Fri 10/01/2004 at 08:36
Category: xtla-core.el
Priority: 5 - Normal
Resolution: None
Assigned to: moy
Originator Email:
Status: Open
Planned Release: 0.9
Type of request: small bug
Fixed Release:
Test case:
Summary: write operations on signed archive fail if gpg prompts for a
passphrase
Original Submission: if the archive is signed with a passphrase, operations
like "tla commit" prompt for a passphrase. Since tla is ran non-interactively
in xtla, it just fails with a message
gpg: cannot open `/dev/tty': No such device or address
signature command exited with non-0 status (2)
There is a workaround currently, which is to have an unprotected passphrase, or
to use a separate module to manage passphrase prompting. I guess gpg-agent and
pinentry can do this:
http://www.gnupg.org/aegypten/tech.en.html
To solve the problem in xtla, the best solution is probably to run those write
operations with (ansi-term), so that tla actually runs in a tty.
Follow-up Comments
------------------
-------------------------------------------------------
Date: Fri 10/01/2004 at 20:16 By: Matthieu MOY <moy>
I'll take care of this.
What is precisely the list of problematic commands ?
commit
cacherev
import
tag
?
For detailed info, follow this link:
<http://gna.org/bugs/?func=detailitem&item_id=833>
_______________________________________________
Message sent via/by Gna!
http://gna.org/