What happens if trying that to ignore an ordinary on-disk folder that gives you no access per ls -ld
?
I tried a chmod 0
on one, and it was ignored, except for the lstat that’s done to exclude block devices.
This check is not logged, but the filtering is, e.g. at About → Show log → Live → Verbose. Example:
$ ls -l /home/erik
total 8
-rw-r--r-- 1 root root 5 May 13 20:04 ordinary_file
d--------- 2 root root 4096 May 13 20:06 pCloudDrive
$ ls -ld /home/erik/pCloudDrive
d--------- 2 root root 4096 May 13 20:06 /home/erik/pCloudDrive
$ stat /home/erik/pCloudDrive
File: '/home/erik/pCloudDrive'
Size: 4096 Blocks: 8 IO Block: 4096 directory
Device: 801h/2049d Inode: 1106553 Links: 2
Access: (0000/d---------) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2020-05-13 20:06:51.014037935 -0400
Modify: 2020-05-13 20:06:51.014037935 -0400
Change: 2020-05-13 20:06:51.014037935 -0400
Birth: -
$ ls /home/erik/pCloudDrive
ls: cannot open directory '/home/erik/pCloudDrive': Permission denied
$
From live log of a backup of /home/erik with an
Edit as text filter of -/home/erik/pCloudDrive/
(the live log uses reverse-chronological order)
May 15, 2020 11:42 AM: Backend event: Put - Completed: duplicati-20200515T154249Z.dlist.zip (707 bytes)
May 15, 2020 11:42 AM: Backend event: Put - Started: duplicati-20200515T154249Z.dlist.zip (707 bytes)
May 15, 2020 11:42 AM: Backend event: Put - Completed: duplicati-ib65103ee0d37485db0a94929c2a982f0.dindex.zip (652 bytes)
May 15, 2020 11:42 AM: Backend event: Put - Started: duplicati-ib65103ee0d37485db0a94929c2a982f0.dindex.zip (652 bytes)
May 15, 2020 11:42 AM: Backend event: Put - Completed: duplicati-bce9635ccfddc4e33850f96b2bee5ba4f.dblock.zip (998 bytes)
May 15, 2020 11:42 AM: Backend event: Put - Started: duplicati-bce9635ccfddc4e33850f96b2bee5ba4f.dblock.zip (998 bytes)
May 15, 2020 11:42 AM: New file /home/erik/ordinary_file
May 15, 2020 11:42 AM: Checking file for changes /home/erik/ordinary_file, new: True, timestamp changed: True, size changed: True, metadatachanged: True, 5/14/2020 12:04:42 AM vs 1/1/0001 12:00:00 AM
May 15, 2020 11:42 AM: Adding directory /home/erik/
May 15, 2020 11:42 AM: Including path as no filters matched: /home/erik/ordinary_file
May 15, 2020 11:42 AM: Excluding path due to filter: /home/erik/pCloudDrive/ => (/home/erik/pCloudDrive/)
May 15, 2020 11:42 AM: Including source path: /home/erik/
The low-level way to see what’s going on at Linux system call level is with strace. That may be next.
Stepping up a level, knowing your results on the ls
and stat
tests I showed above might be useful.
Is Duplicati running as root or as the /home/erik user? Please test access with whatever Duplicati is.
The live log can give you a better view of the Duplicati-level error too, by clicking on the line of error.
Here’s the error if I stop filtering out /home/erik/pCloudDrive. After the one-line summary are details:
May 15, 2020 12:00 PM: Error reported while accessing file: /home/erik/pCloudDrive/
{"ClassName":"System.UnauthorizedAccessException","Message":"Access to the path '/home/erik/pCloudDrive' is denied.","Data":null,"InnerException":{"ClassName":"System.IO.IOException","Message":"Permission denied","Data":null,"InnerException":null,"HelpURL":null,"StackTraceString":null,"RemoteStackTraceString":null,"RemoteStackIndex":0,"ExceptionMethod":null,"HResult":13,"Source":null},"HelpURL":null,"StackTraceString":" at System.IO.Enumeration.FileSystemEnumerator`1[TResult].CreateDirectoryHandle (System.String path, System.Boolean ignoreNotFound) <0x7f31d22b7490 + 0x000bb> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Enumeration.FileSystemEnumerator`1[TResult]..ctor (System.String directory, System.IO.EnumerationOptions options) <0x7f31d22b70e0 + 0x00101> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Enumeration.FileSystemEnumerable`1+DelegateEnumerator[TResult]..ctor (System.IO.Enumeration.FileSystemEnumerable`1[TResult] enumerable) <0x7f31d22b5740 + 0x00045> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Enumeration.FileSystemEnumerable`1[TResult]..ctor (System.String directory, System.IO.Enumeration.FileSystemEnumerable`1+FindTransform[TResult] transform, System.IO.EnumerationOptions options) <0x7f31d22b5480 + 0x000e3> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Enumeration.FileSystemEnumerableFactory.UserDirectories (System.String directory, System.String expression, System.IO.EnumerationOptions options) <0x7f31d22b61d0 + 0x00116> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Directory.InternalEnumeratePaths (System.String path, System.String searchPattern, System.IO.SearchTarget searchTarget, System.IO.EnumerationOptions options) <0x7f31d2286360 + 0x00084> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Directory.GetDirectories (System.String path, System.String searchPattern, System.IO.EnumerationOptions enumerationOptions) <0x7f31d2286160 + 0x00040> in <285579f54af44a2ca048dad6be20e190>:0 \n at System.IO.Directory.GetDirectories (System.String path) <0x7f31d2286040 + 0x00052> in <285579f54af44a2ca048dad6be20e190>:0 \n at Duplicati.Library.Snapshots.SnapshotBase.ListFolders (System.String localFolderPath) [0x00000] in <e590a2a7b22945658e3565a2bb0865c2>:0 \n at Duplicati.Library.Utility.Utility+<EnumerateFileSystemEntries>d__20.MoveNext () [0x00113] in <3a02d8196bff4b0fabc92721476cc6a0>:0 ","RemoteStackTraceString":null,"RemoteStackIndex":0,"ExceptionMethod":null,"HResult":-2147024891,"Source":"mscorlib"}
Is this pCloud Drive for Linux? If not, what is it? That may impact how hard it is for someone to test it.