I think this has gotten even worse in duplicity. I believe this used to
only affect full backups. But now it seems to affect incremental backups
too.

I've attached a simple reproduction script. It basically just does:

PASSPHRASE=one duplicity full /tmp/testdir file://$DIR
PASSPHRASE=two duplicity /tmp/testdir file://$DIR

Although the second duplicity run complains about a bad password, it
will still continue and make an incremental backup with a different
passphrase than the full volumes.

Tested with duplicity 0.7.18.2.

I've worked around this behavior in deja-dup 39.1.

** Attachment added: "repro.sh"
   
https://bugs.launchpad.net/duplicity/+bug/918489/+attachment/5253715/+files/repro.sh

** Summary changed:

- duplicity allows bad passphrase on full backup if archive cache exists
+ duplicity allows a new, different passphrase if an archive cache exists

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489

Title:
  duplicity allows a new, different passphrase if an archive cache
  exists

To manage notifications about this bug go to:
https://bugs.launchpad.net/deja-dup/+bug/918489/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to