Your message dated Fri, 10 Oct 2025 02:34:14 +0000
with message-id <[email protected]>
and subject line Bug#1115151: fixed in duplicity 3.0.5.1-1
has caused the Debian Bug report #1115151,
regarding duplicity: Duplicity refuse email as gpg key identifier
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1115151: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115151
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duplicity
Version: 3.0.4-1+b1
Severity: important
X-Debbugs-Cc: [email protected]
Hello,
There is a regression with the latest duplicity update: the application refuse
an email adress as gpg identifier:
LANG=C duplicity --encrypt-key [email protected]
CommandLineError: Encrypt key should be an 8, 16, or 40 character hex string,
like 'AA0E73D2'.
Received '[email protected]' length=16 instead.
Enter 'duplicity --help' for help screen.
This is not what the behavior defined in the manual:
--encrypt-key key-id
When backing up, encrypt to the given public key, instead
of using
symmetric (traditional) encryption. Can be specified multiple
times. The
key-id can be given in any of the formats supported by GnuPG;
see gpg(1),
section "HOW TO SPECIFY A USER ID" for details.
and this also breaks a backup workflow if the configuration was using an email
adress previously.
-- System Information:
Debian Release: 13.1
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'oldstable-updates'), (500,
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.12.43+deb13-amd64 (SMP w/32 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages duplicity depends on:
ii gnupg 2.4.7-21
ii libc6 2.41-12
ii librsync2t64 2.3.4-1.1+b1
ii python3 3.13.5-1
ii python3-fasteners 0.18-2
ii python3-httplib2 0.22.0-1
ii python3-lxml 5.4.0-1
ii python3-paramiko 3.5.1-3
ii python3-pexpect 4.9-3
ii python3-pkg-resources 78.1.1-0.1
ii python3-psutil 7.0.0-2
ii python3-requests 2.32.3+dfsg-5
Versions of packages duplicity recommends:
ii python3-oauthlib 3.2.2-3
ii python3-urllib3 2.3.0-3
ii rsync 3.4.1+ds1-5
Versions of packages duplicity suggests:
pn lftp <none>
pn ncftp <none>
pn par2 <none>
pn python3-boto3 <none>
ii python3-pip 25.1.1+dfsg-1
pn python3-swiftclient <none>
pn tahoe-lafs <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: duplicity
Source-Version: 3.0.5.1-1
Done: Alexander Zangerl <[email protected]>
We believe that the bug you reported is fixed in the latest version of
duplicity, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alexander Zangerl <[email protected]> (supplier of updated duplicity package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 10 Oct 2025 11:20:40 +1000
Source: duplicity
Architecture: source
Version: 3.0.5.1-1
Distribution: unstable
Urgency: medium
Maintainer: Alexander Zangerl <[email protected]>
Changed-By: Alexander Zangerl <[email protected]>
Closes: 1115151
Changes:
duplicity (3.0.5.1-1) unstable; urgency=medium
.
* new upstream release (closes: #1115151)
Checksums-Sha1:
c25a38058a6a978da5503e783dbf28408cd9022e 2078 duplicity_3.0.5.1-1.dsc
4421381017cb9585ef5518561acde9104abc8759 951879 duplicity_3.0.5.1.orig.tar.bz2
4f907edd2c75ca5b315c2389f50610f60c121a43 16764
duplicity_3.0.5.1-1.debian.tar.xz
5f3d43d8556d9dda86782bd9a006920621bff28e 10913
duplicity_3.0.5.1-1_amd64.buildinfo
Checksums-Sha256:
3b180f564fee2b75a5841ded79b51ccb2762e3ee4c47629cbc906a3cfb9d338d 2078
duplicity_3.0.5.1-1.dsc
3c053d6c82e3d0b207db565b42ec97d4ba40a9a3961c7641e9505e968a8e7556 951879
duplicity_3.0.5.1.orig.tar.bz2
c7f746c5f0a8f7ad2401404ced19994de6b20ac8e04620faedc4be2d0fd931ad 16764
duplicity_3.0.5.1-1.debian.tar.xz
61379c76b9519a4f979d6b5dc18f24b09843eaf02358da6d18ff1762eff61b16 10913
duplicity_3.0.5.1-1_amd64.buildinfo
Files:
6ab97065d4e68fd9ca631f43ebeb5de0 2078 utils optional duplicity_3.0.5.1-1.dsc
f03c86a1490bdffd072acf6286048746 951879 utils optional
duplicity_3.0.5.1.orig.tar.bz2
5b4d8816f27688cadd9c5c2d7237c10f 16764 utils optional
duplicity_3.0.5.1-1.debian.tar.xz
b954fb4dec1c7c66f6e926a891e1736a 10913 utils optional
duplicity_3.0.5.1-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=H7YZ
-----END PGP SIGNATURE-----
pgpqdlokzOew1.pgp
Description: PGP signature
--- End Message ---