abrt version: 1.1.13 architecture: i686 cmdline: /usr/bin/python /usr/bin/duplicity cleanup --force sftp://andrei.nu/home/andrei --gio --verbosity=9 --archive-dir=/home/andrei/.cache/deja-dup --log-file=/tmp/deja-dup-0H5PLV component: duplicity executable: /usr/bin/duplicity kernel: 2.6.35.6-48.fc14.i686 package: duplicity-0.6.10-1.fc14 reason: getpass.py:135:_raw_input:EOFError release: Fedora release 14 (Laughlin) time: 1289254391 uid: 500 backtrace ----- getpass.py:135:_raw_input:EOFError Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/duplicity/backends/giobackend.py", line 59, in ask_password self.set_password(self.backend.get_password()) File "/usr/lib/python2.7/site-packages/duplicity/backend.py", line 354, in get_password (self.parsed_url.username,self.parsed_url.hostname) ) File "/usr/lib/python2.7/getpass.py", line 83, in unix_getpass passwd = fallback_getpass(prompt, stream) File "/usr/lib/python2.7/getpass.py", line 118, in fallback_getpass return _raw_input(prompt, stream) File "/usr/lib/python2.7/getpass.py", line 135, in _raw_input raise EOFError EOFError Local variables in innermost frame: input: <open file '<stdin>', mode 'r' at 0xb7873020> line: '' prompt: "Password for 'None@None': " stream: <open file '<stderr>', mode 'w' at 0xb78730d0>
Created attachment 458917 [details] File: backtrace
How can this issue be reproduced or what exactly did you do? Were you asked for a password for sftp or is there a key to be used? Did that issue exist with versions before duplicity-0.6.10-1 already?
Package: duplicity-0.6.11-1.fc14 Architecture: i686 OS Release: Fedora release 14 (Laughlin) How to reproduce ----- 1. closed a nautilus window with sftp dir open 2. 3.
duplicity-0.6.17-1.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/duplicity-0.6.17-1.fc16
duplicity-0.6.17-1.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/duplicity-0.6.17-1.fc15
duplicity-0.6.17-1.el6 has been submitted as an update for Fedora EPEL 6. https://admin.fedoraproject.org/updates/duplicity-0.6.17-1.el6
duplicity-0.6.17-1.el5 has been submitted as an update for Fedora EPEL 5. https://admin.fedoraproject.org/updates/duplicity-0.6.17-1.el5
Package duplicity-0.6.17-1.el6: * should fix your issue, * was pushed to the Fedora EPEL 6 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=epel-testing duplicity-0.6.17-1.el6' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-EPEL-2011-5334/duplicity-0.6.17-1.el6 then log in and leave karma (feedback).
duplicity-0.6.17-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
duplicity-0.6.17-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
duplicity-0.6.17-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
duplicity-0.6.17-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.