Please post your /root/.duply/full/exclude file. Looks like /dev is not
really being excluded.
On Sat, Jun 14, 2014 at 4:38 AM, Andreas <email address hidden> wrote:
> I've updated to 0.6.24. /dev and /proc are excluded.
>
> Error remains. Sorry.
>
> ** Attachment added: "Complete log with 0.6.24 installed"
>
> https://bugs.launchpad.net/duplicity/+bug/1327550/+attachment/4131360/+files/Duply-log-complete-20140614.txt
>
> --
> You received this bug notification because you are subscribed to
> Duplicity.
> https://bugs.launchpad.net/bugs/1327550
>
> Title:
> OverflowError: signed integer is greater than maximum
>
> Status in Duplicity - Bandwidth Efficient Encrypted Backup:
> New
>
> Bug description:
> Duplicity version: v1.5.2.3
> Python version: Python 2.6.6 (r266:84292, Dec 26 2010, 22:31:48)
> OS Distro and version: Debian GNU/Linux 6.0.9 (squeeze)
> Type of target filesystem: Linux (FTP)
> Log output: attached
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/duplicity/+bug/1327550/+subscriptions
>
Please post your /root/. duply/full/ exclude file. Looks like /dev is not
really being excluded.
On Sat, Jun 14, 2014 at 4:38 AM, Andreas <email address hidden> wrote:
> I've updated to 0.6.24. /dev and /proc are excluded. /bugs.launchpad .net/duplicity/ +bug/1327550/ +attachment/ 4131360/ +files/ Duply-log- complete- 20140614. txt /bugs.launchpad .net/bugs/ 1327550 /bugs.launchpad .net/duplicity/ +bug/1327550/ +subscriptions
>
> Error remains. Sorry.
>
> ** Attachment added: "Complete log with 0.6.24 installed"
>
> https:/
>
> --
> You received this bug notification because you are subscribed to
> Duplicity.
> https:/
>
> Title:
> OverflowError: signed integer is greater than maximum
>
> Status in Duplicity - Bandwidth Efficient Encrypted Backup:
> New
>
> Bug description:
> Duplicity version: v1.5.2.3
> Python version: Python 2.6.6 (r266:84292, Dec 26 2010, 22:31:48)
> OS Distro and version: Debian GNU/Linux 6.0.9 (squeeze)
> Type of target filesystem: Linux (FTP)
> Log output: attached
>
> To manage notifications about this bug go to:
> https:/
>