IOError: GnuPG exited non-zero, with code 2
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Duplicity |
Fix Released
|
Undecided
|
Unassigned | ||
duplicity (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: duplicity
Since the upgrade to Jaunty, I get the following error when running Duplicity:
/usr/bin/duplicity --num-retries=20 --timeout=100 --include-
Traceback (most recent call last):
File "/usr/bin/
with_
File "/usr/bin/
fn()
File "/usr/bin/
incremental
File "/usr/bin/
bytes_written = write_multivol(
File "/usr/bin/
globals.
File "/usr/lib/
data = block_iter.
File "/usr/lib/
result = self.process(
File "/usr/lib/
for new_path, sig_path in collated:
File "/usr/lib/
relem2 = riter2.next()
File "/usr/lib/
refresh_
File "/usr/lib/
new_triple = get_triple(
File "/usr/lib/
path = path_iter_
File "/usr/lib/
sigtarobj.
File "/usr/lib/
assert not self.fileobj.
File "/usr/lib/
self.
File "/var/lib/
raise IOError, "GnuPG exited non-zero, with code %d" % (e >> 8)
IOError: GnuPG exited non-zero, with code 2
Duplicity: 0.5.09-0ubuntu2
python-
Related branches
Changed in duplicity: | |
status: | New → Fix Released |
Same problem here after trying an incremental backup after a full backup.
In my environment, it seems the PASSPHRASE variable is not recognized.
Debugging:
strace -s 128 -f duplicity .... > xy
grep GNUPG < xy
gives: PASSPHRASE\ n"..., 28) = 28 n"..., 41) = 41 N\n"... , 26) = 26 FAILED\ n"..., 27) = 27 n"..., 24) = 24 headiss" ..., 4096) = 347
[pid 15476] write(4, "[GNUPG:] ENC_TO 37105F933226F 16 0\n"..., 38) = 38
[pid 15476] write(4, "[GNUPG:] USERID_HINT 37105F9C3216F backup key <email address hidden>\n"..., 99) = 99
[pid 15476] write(4, "[GNUPG:] NEED_PASSPHRASE 37105F9C3216F 62E7B190B96DE 16 0\n"..., 64) = 64
[pid 15476] write(4, "[GNUPG:] MISSING_
[pid 15476] write(4, "[GNUPG:] BAD_PASSPHRASE 37105F9C3216F\
[pid 15476] write(4, "[GNUPG:] BEGIN_DECRYPTIO
[pid 15476] write(4, "[GNUPG:] DECRYPTION_
[pid 15476] write(4, "[GNUPG:] END_DECRYPTION\
[pid 15469] read(4, "[GNUPG:] ENC_TO 37105F9C3216F 16 0\n[GNUPG:] USERID_HINT 37105F9C3216F backup key <dustbin@
Hope that hint helps.
It's not clear to me where actually the PASSPHRASE variable gets evaluated. pyshared/ duplicity) I cant find a hint on it.
In the sources of duplicity (/usr/share/