Your message dated Wed, 31 Dec 2025 12:33:35 +0000
with message-id <[email protected]>
and subject line Bug#1124322: fixed in duplicity 3.0.6.3-2
has caused the Debian Bug report #1124322,
regarding duplicity: Backup fails due to GPG passphrase even when run with
--no-encryption
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1124322: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1124322
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duplicity
Version: 3.0.6.3-1
Severity: important
Dear Maintainer,
duplicity is used with duply since several years. With the new version of
duplicity the backup is not working anymore.
duplicity is run with --no-encryption argument, but still seems to require a
password. Please see the log below.
Start duply v2.5.5, time is 2025-12-30 09:39:20.
Using profile '/root/.duply/meister'.
Using installed duplicity version 3.0.6.3, python 3.13.11 (/usr/bin/python3)
'PYTHONPATH=:/usr/lib/python313.zip:/usr/lib/python3.13:/usr/lib/python3.13/lib-
dynload:/usr/local/lib/python3.13/dist-packages:/usr/lib/python3/dist-
packages', gpg 2.4.8 (Home: /root/.gnupg), awk 'mawk 1.3.4 20250131', grep
'grep (GNU grep) 3.12', bash 'GNU bash, Version 5.3.3(1)-release (x86_64-pc-
linux-gnu)'.
Checking TEMP_DIR '/tmp' is a folder and writable (OK)
Test - En/Decryption skipped. (GPG='disabled')
--- Start running command BKP at 2025-12-30 09:39:20.601 ---
GPG binary is /bin/gpg, version 2.4.8
Import of duplicity.backends._testbackend Failed
Lese globbing Dateiliste /root/.duply/meister/exclude
Using archive dir: /root/.cache/duplicity/duply_meister
Using backup name: duply_meister
================================================================================
duplicity 3.0.6.3
Args: /bin/duplicity backup --name duply_meister --no-encryption --verbosity 7
--full-if-older-than 2W --volsize 1000 --exclude-filelist
/root/.duply/meister/exclude / file:///var/backup/duply
Linux meister 6.17.13+deb14-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.17.13-1
(2025-12-20) x86_64
/usr/bin/python3 3.13.11 (main, Dec 8 2025, 11:43:54) [GCC 15.2.0]
================================================================================
Temporäres Verzeichnis /tmp/duplicity-rk__qrnk-tempdir wird benutzt
Temp has 4,095,049,728 available, backup will use approx 2,411,724,800.
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
inc.20251226T080315Z.to.20251227T102315Z.manifest (362529)
1 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
inc.20251223T101213Z.to.20251224T080357Z.manifest (174581)
1 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
full.20251208T192153Z.manifest (29943840)
12 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
inc.20251225T083323Z.to.20251226T080315Z.manifest (89382)
1 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
full.20251108T192910Z.manifest (30091626)
13 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
full.20251223T101213Z.manifest (11633997)
10 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
inc.20251224T080357Z.to.20251225T083323Z.manifest (60285)
1 Volumen in Manifest gefunden
Processing local manifest /root/.cache/duplicity/duply_meister/duplicity-
full.20251123T083302Z.manifest (30142430)
13 Volumen in Manifest gefunden
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Tue Dec 23
11:12:13 2025; benötigt: Sat Nov 8 20:29:10 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Tue Dec 23
11:12:13 2025; benötigt: Sun Nov 23 09:33:02 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Tue Dec 23
11:12:13 2025; benötigt: Mon Dec 8 20:21:53 2025)
Schrittweiser Sicherungssatz wurde hinzugefügt (Startzeit: Tue Dec 23 11:12:13
2025; Endzeit: Wed Dec 24 09:03:57 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Wed Dec 24
09:03:57 2025; benötigt: Sat Nov 8 20:29:10 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Wed Dec 24
09:03:57 2025; benötigt: Sun Nov 23 09:33:02 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Wed Dec 24
09:03:57 2025; benötigt: Mon Dec 8 20:21:53 2025)
Schrittweiser Sicherungssatz wurde hinzugefügt (Startzeit: Wed Dec 24 09:03:57
2025; Endzeit: Thu Dec 25 09:33:23 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Thu Dec 25
09:33:23 2025; benötigt: Sat Nov 8 20:29:10 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Thu Dec 25
09:33:23 2025; benötigt: Sun Nov 23 09:33:02 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Thu Dec 25
09:33:23 2025; benötigt: Mon Dec 8 20:21:53 2025)
Schrittweiser Sicherungssatz wurde hinzugefügt (Startzeit: Thu Dec 25 09:33:23
2025; Endzeit: Fri Dec 26 09:03:15 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Fri Dec 26
09:03:15 2025; benötigt: Sat Nov 8 20:29:10 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Fri Dec 26
09:03:15 2025; benötigt: Sun Nov 23 09:33:02 2025)
Schrittweiser Sicherungssatz wird vernachlässigt (Startzeit: Fri Dec 26
09:03:15 2025; benötigt: Mon Dec 8 20:21:53 2025)
Schrittweiser Sicherungssatz wurde hinzugefügt (Startzeit: Fri Dec 26 09:03:15
2025; Endzeit: Sat Dec 27 11:23:15 2025)
Lokale und entfernte Metadaten sind bereits synchron, kein Abgleich benötigt.
Last full backup date: Tue Dec 23 11:12:13 2025
No encryption keys configured.
No environment variables are set, asking user.
/usr/lib/python3.13/getpass.py:90: GetPassWarning: Can not control echo on the
terminal.
passwd = fallback_getpass(prompt, stream)
Warning: Password input may be echoed.
GnuPG passphrase for decryption: Traceback (innermost last):
File "/usr/lib/python3/dist-packages/duplicity/__main__.py", line 77, in
dup_run
with_tempdir(main)
~~~~~~~~~~~~^^^^^^
File "/usr/lib/python3/dist-packages/duplicity/__main__.py", line 61, in
with_tempdir
fn()
~~^^
File "/usr/lib/python3/dist-packages/duplicity/dup_main.py", line 1640, in
main
do_backup(action)
~~~~~~~~~^^^^^^^^
File "/usr/lib/python3/dist-packages/duplicity/dup_main.py", line 1718, in
do_backup
config.gpg_profile.passphrase = get_passphrase(1, action)
~~~~~~~~~~~~~~^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/duplicity/dup_main.py", line 187, in
get_passphrase
pass1 = getpass_safe(f"{_('GnuPG passphrase for decryption:')} ")
File "/usr/lib/python3/dist-packages/duplicity/dup_main.py", line 80, in
getpass_safe
return getpass.getpass(message)
~~~~~~~~~~~~~~~^^^^^^^^^
File "/usr/lib/python3.13/getpass.py", line 90, in unix_getpass
passwd = fallback_getpass(prompt, stream)
File "/usr/lib/python3.13/getpass.py", line 126, in fallback_getpass
return _raw_input(prompt, stream)
File "/usr/lib/python3.13/getpass.py", line 148, in _raw_input
raise EOFError
EOFError
2025-12-30 09:39:22.357 Task 'BKP' failed with exit code '30'.
--- Finished state FAILED 'code 30' at 2025-12-30 09:39:22.357 - Runtime
00:00:01.756 ---
-- System Information:
Debian Release: forky/sid
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.17.13+deb14-amd64 (SMP w/6 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages duplicity depends on:
ii gnupg 2.4.8-4
ii libc6 2.42-6
ii librsync2t64 2.3.4-1.1+b1
ii python3 3.13.7-1+b1
ii python3-fasteners 0.19-2
ii python3-httplib2 0.22.0-1
ii python3-lxml 6.0.2-1+b3
ii python3-paramiko 4.0.0-1
ii python3-pexpect 4.9-3
ii python3-psutil 7.1.0-1
ii python3-requests 2.32.5+dfsg-1
ii python3-setuptools 78.1.1-0.1
Versions of packages duplicity recommends:
ii python3-oauthlib 3.3.1-1
ii python3-socks 1.7.1+dfsg-1
ii python3-urllib3 2.5.0-1
ii rsync 3.4.1+ds1-7
Versions of packages duplicity suggests:
pn b2sdk <none>
pn lftp <none>
pn ncftp <none>
pn par2 <none>
pn python3-boto3 <none>
ii python3-pip 25.3+dfsg-1
pn python3-swiftclient <none>
pn tahoe-lafs <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: duplicity
Source-Version: 3.0.6.3-2
Done: Alexander Zangerl <[email protected]>
We believe that the bug you reported is fixed in the latest version of
duplicity, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alexander Zangerl <[email protected]> (supplier of updated duplicity package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 31 Dec 2025 13:52:00 +1000
Source: duplicity
Architecture: source
Version: 3.0.6.3-2
Distribution: unstable
Urgency: high
Maintainer: Alexander Zangerl <[email protected]>
Changed-By: Alexander Zangerl <[email protected]>
Closes: 1124322
Changes:
duplicity (3.0.6.3-2) unstable; urgency=high
.
* pulled and reworked upstream's patch for various
passphrase-related regressions. some of that logic is still
exceptionally dodgy. (closes: #1124322)
Checksums-Sha1:
3f0354a991a4b6f7cb1ce6a26b20e45ac2befdcf 2035 duplicity_3.0.6.3-2.dsc
0cdb01624a50ebf6aaa5965c13826af029a42516 21396
duplicity_3.0.6.3-2.debian.tar.xz
d7e373566047a4f2684557f5b8a2ca42682ec9cb 10962
duplicity_3.0.6.3-2_amd64.buildinfo
Checksums-Sha256:
02f6353a97b903e46d3461892d8dd0d5827870457f18b1eb1cf7a5640e306531 2035
duplicity_3.0.6.3-2.dsc
03c4b9ceebf30e41fd986d442ac3500b79935314bb69d4e5b2e1644ca3fa0ca1 21396
duplicity_3.0.6.3-2.debian.tar.xz
d11749e922dc535d92a53f1c414970676a3564cb2952b7018397f26635df5819 10962
duplicity_3.0.6.3-2_amd64.buildinfo
Files:
71a018392840b00e9d4ddacc8011ba2c 2035 utils optional duplicity_3.0.6.3-2.dsc
0f03d9da2d78ea314dbfcef6aed5f65f 21396 utils optional
duplicity_3.0.6.3-2.debian.tar.xz
291816f8ffc5db61c19617230718e400 10962 utils optional
duplicity_3.0.6.3-2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=ZNAc
-----END PGP SIGNATURE-----
pgpKDFTO1VP_g.pgp
Description: PGP signature
--- End Message ---