Eit problems

Anything that pertains to Portage

Moderator: Moderators

Post Reply
skullbocks
Baby Hen
Posts: 19
Joined: Sun Dec 24, 2006 11:53

Eit problems

Post by skullbocks » Wed Apr 02, 2014 11:10

Hello everybody.
I'm trying to make my own sabayon repository and I have some troubles with eit.
When I add some app like android-ndk or metasploit, I get this output:

Code: Select all

/usr/bin/lddtree: warning: /usr/lib64/metasploit9999/data/meterpreter/ext_server_stdapi.lso: Magic number does not match
☛  * [spike] Mirror non sbloccati. Sincronizzali.
Traceback (most recent call last):
  File "/usr/bin/eit", line 17, in <module>
    main()
  File "/usr/lib/entropy/server/eit/main.py", line 114, in main
    exit_st = func(*func_args)
  File "/usr/lib/entropy/server/eit/commands/command.py", line 237, in _call_exclusive
    return func(server)
  File "/usr/lib/entropy/server/eit/commands/commit.py", line 516, in _commit
    exit_st = self._add_packages(entropy_server, repository_id, added_s)
  File "/usr/lib/entropy/server/eit/commands/commit.py", line 354, in _add_packages
    repository_id, etp_pkg_files)
  File "/usr/lib/entropy/lib/entropy/server/interfaces/main.py", line 6867, in add_packages_to_repository
    [(x, repository_id) for x in package_ids_added], ask = ask)
  File "/usr/lib/entropy/lib/entropy/server/interfaces/main.py", line 6753, in _add_packages_qa_tests
    self.missing_runtime_dependencies_test(package_matches, ask = ask)
  File "/usr/lib/entropy/lib/entropy/server/interfaces/main.py", line 6529, in missing_runtime_dependencies_test
    self, target_matches)
  File "/usr/lib/entropy/lib/entropy/qa.py", line 465, in warn_missing_dependencies
    (package_id, repo_id))
  File "/usr/lib/entropy/lib/entropy/qa.py", line 1236, in _get_unresolved_sonames
    sonames = entropy.tools.read_elf_real_dynamic_libraries(elf_file)
  File "/usr/lib/entropy/lib/entropy/tools.py", line 2745, in read_elf_real_dynamic_libraries
    raise FileNotFound("lddtree returned error")
FileNotFound: lddtree returned error

Frame main in /usr/lib/entropy/server/eit/main.py at line 114
	           func_args = [<bound method EitAdd._commit of <eit.commands.add.EitAdd object at 0x6daf10>>, None]
	                args = [u'metasploit-9999']
	         _to_unicode = <function _to_unicode at 0x1103a28>
	            args_map = {'files': <class 'eit.commands.files.EitFiles'>, 'ci': <class 'eit.commands.commit.EitCommit'>, 'own': <class 'eit.commands.own.EitOwn'>, 'co': <class 'eit.commands.checkout.EitCheckout'>, 'help': <class 'eit.commands.help.EitHelp'>, 'bump': <class 'eit.commands.bump.EitBump'>, 'lock': <class 'eit.commands.lock.EitLock'>, 'sync': <class 'eit.commands.push.EitPush'>, 'unlock': <class 'eit.commands.lock.EitUnlock'>, 'query': <class 'eit.commands.query.EitQuery'>, 'cp': <class 'eit.commands.cp.EitCp'>, 'cn': <class 'eit.commands.cleanup.EitCleanup'>, 'rp': <class 'eit.commands.repack.EitRepack'>, 'log': <class 'eit.commands.log.EitLog'>, 'fit': <class 'eit.commands.inject.EitInject'>, 'graph': <class 'eit.commands.graph.EitGraph'>, '-h': <class 'eit.commands.help.EitHelp'>, 'init': <class 'eit.commands.init.EitInit'>, 'cleanup': <class 'eit.commands.cleanup.EitCleanup'>, 'inject': <class 'eit.commands.inject.EitInject'>, 'branch': <class 'eit.commands.branch.EitBranch'>, 'test': <class 'eit.commands.test.EitTest'>, 'rm': <class 'eit.commands.remove.EitRemove'>, 'checkout': <class 'eit.commands.checkout.EitCheckout'>, 'match': <class 'eit.commands.match.EitMatch'>, 'status': <class 'eit.commands.status.EitStatus'>, 'notice': <class 'eit.commands.notice.EitNotice'>, 'clean': <class 'eit.commands.cleanup.EitCleanup'>, 'repo': <class 'eit.commands.repo.EitRepo'>, 'pkgmove': <class 'eit.commands.pkgmove.EitPkgmove'>, 'add': <class 'eit.commands.add.EitAdd'>, 'key': <class 'eit.commands.key.EitKey'>, 'vacuum': <class 'eit.commands.cleanup.EitVacuum'>, 'revgraph': <class 'eit.commands.revgraph.EitRevgraph'>, 'reset': <class 'eit.commands.reset.EitReset'>, 'pull': <class 'eit.commands.pull.EitPull'>, 'search': <class 'eit.commands.search.EitSearch'>, 'remote': <class 'eit.commands.remote.EitRemote'>, 'f': <class 'eit.commands.files.EitFiles'>, 'repack': <class 'eit.commands.repack.EitRepack'>, 'list': <class 'eit.commands.list.EitList'>, 'remove': <class 'eit.commands.remove.EitRemove'>, 'st': <class 'eit.commands.status.EitStatus'>, 'q': <class 'eit.commands.query.EitQuery'>, 'merge': <class 'eit.commands.merge.EitMerge'>, 'mv': <class 'eit.commands.mv.EitMv'>, 'deps': <class 'eit.commands.deps.EitDeps'>, 'push': <class 'eit.commands.push.EitPush'>, 'commit': <class 'eit.commands.commit.EitCommit'>, '--help': <class 'eit.commands.help.EitHelp'>}
	             cmd_obj = <eit.commands.add.EitAdd object at 0x6daf10>
	                 cmd = u'add'
	           cmd_class = <class 'eit.commands.add.EitAdd'>
	          descriptor = <eit.commands.descriptor.EitCommandDescriptor object at 0x1100d10>
	         is_bashcomp = False
	           catch_all = <class 'eit.commands.help.EitHelp'>
	               alias = 'clean'
	               klass = <class 'eit.commands.mv.EitMv'>
	                func = <bound method EitAdd._call_exclusive of <eit.commands.add.EitAdd object at 0x6daf10>>
	             allowed = True
	            last_arg = u'metasploit-9999'
	         descriptors = [<eit.commands.descriptor.EitCommandDescriptor object at 0x109cf10>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10aa350>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10aa710>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10aac10>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10aad90>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8090>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8310>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8690>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8710>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8f50>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10b8f90>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10c2210>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10c2710>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ce210>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ce250>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ce410>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ce610>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ce7d0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10cea90>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10cecd0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ceed0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10eb550>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10eb850>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10eba90>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10ebed0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4150>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4390>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4750>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4910>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4b10>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4f10>, <eit.commands.descriptor.EitCommandDescriptor object at 0x10f4fd0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x1100150>, <eit.commands.descriptor.EitCommandDescriptor object at 0x11005d0>, <eit.commands.descriptor.EitCommandDescriptor object at 0x1100890>, <eit.commands.descriptor.EitCommandDescriptor object at 0x1100b10>, <eit.commands.descriptor.EitCommandDescriptor object at 0x1100d10>]

Frame _call_exclusive in /usr/lib/entropy/server/eit/commands/command.py at line 242
	        server_class = <class 'entropy.server.interfaces.main.Server'>
	            acquired = True
	                lock = <entropy.locks.EntropyResourcesLock object at 0x1100c50>
	                self = <eit.commands.add.EitAdd object at 0x6daf10>
	              server = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	                repo = None
	                func = <bound method EitAdd._commit of <eit.commands.add.EitAdd object at 0x6daf10>>
	           skip_lock = False

Frame _commit in /usr/lib/entropy/server/eit/commands/commit.py at line 516
	          pkg_filter = <function pkg_filter at 0x6b6ef50>
	          key_sorter = <function <lambda> at 0x1103cf8>
	       repository_id = u'spike'
	             exit_st = 0
	          scan_added = set([(u'net-analyzer/metasploit-9999', 32042), (u'dev-ruby/metasploit_data_models-0.17.0', 32041)])
	         to_be_added = set([u'net-analyzer/metasploit-9999'])
	       scan_injected = set([])
	       to_be_removed = set([])
	             added_s = [u'net-analyzer/metasploit-9999']
	      to_be_injected = set([])
	      entropy_server = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	                self = <eit.commands.add.EitAdd object at 0x6daf10>
	        scan_removed = set([])

Frame _add_packages in /usr/lib/entropy/server/eit/commands/commit.py at line 354
	        spm_name_txt = u'\x1b[35mnet-analyzer/metasploit-9999\x1b[39;49;00m'
	       repository_id = u'spike'
	             repo_id = 1
	            spm_slot = u'9999'
	             exit_st = None
	                self = <eit.commands.add.EitAdd object at 0x6daf10>
	       etp_pkg_files = [([u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2'], False)]
	            problems = False
	            pkg_list = [u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2']
	            spm_repo = u'gentoo'
	            etp_repo = None
	           generated = deque([[u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2']])
	            spm_name = u'net-analyzer/metasploit-9999'
	               asker = <function asker at 0x266c488>
	             spm_key = u'net-analyzer/metasploit'
	                  rc = u'Si'
	              pkg_id = -1
	      entropy_server = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	            packages = [u'net-analyzer/metasploit-9999']

Frame add_packages_to_repository in /usr/lib/entropy/lib/entropy/server/interfaces/main.py at line 6867
	               count = (1, 1)
	       repository_id = u'spike'
	    package_filepath = u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2'
	      to_be_injected = set([(265, u'/var/lib/entropy/server/spike/upload/packages/amd64/5/net-analyzer/net-analyzer:metasploit-9999.a7a57c869a26875fb995ed2e753e56ea9d1c3b94~10000.tbz2')])
	              dbconn = <EntropySQLiteRepository instance at 0x2665f90, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: True|True, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>
	                self = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	            maxcount = 1
	   destination_paths = [u'/var/lib/entropy/server/spike/upload/packages/amd64/5/net-analyzer/net-analyzer:metasploit-9999.a7a57c869a26875fb995ed2e753e56ea9d1c3b94~10000.tbz2']
	              header = '\x1b[34;01m @@ \x1b[39;49;00m'
	          package_id = 265
	              inject = False
	   package_ids_added = set([265])
	                 ask = True
	                   x = 265
	       packages_data = [([u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2'], False)]
	             mycount = 1
	   package_filepaths = [u'/var/lib/entropy/server/spike/store/amd64/net-analyzer:metasploit-9999.tbz2']

Frame _add_packages_qa_tests in /usr/lib/entropy/lib/entropy/server/interfaces/main.py at line 6753
	                 ask = True
	                self = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	     package_matches = [(265, u'spike')]

Frame missing_runtime_dependencies_test in /usr/lib/entropy/lib/entropy/server/interfaces/main.py at line 6529
	get_blacklisted_deps = <function get_blacklisted_deps at 0x26e2230>
	pkg_blacklisted_deps = set([])
	                 obj = [265]
	    blacklisted_deps = {}
	         missing_map = {(265, u'spike'): {(u'libcrypto.so.0.9.8', 1): set([u'app-emulation/emul-linux-x86-baselibs:0'])}}
	                self = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	                 ask = True
	            pkg_repo = u'spike'
	      repo_blacklist = set([])
	     package_matches = [(265, u'spike')]
	         package_ids = [265]
	       bump_packages = False
	               my_qa = <entropy.qa.QAInterface object at 0x6b6a150>
	              pkg_id = 265
	                   x = 265
	             pkg_map = {u'spike': [265]}
	              dbconn = <EntropySQLiteRepository instance at 0x1121bd0, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: False|False, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>
	      target_matches = [(265, u'spike')]

Frame warn_missing_dependencies in /usr/lib/entropy/lib/entropy/qa.py at line 465
	               count = 1
	             repo_id = u'spike'
	_filter_missing_sonames = <function _filter_missing_sonames at 0x26e21b8>
	        _warn_soname = <function _warn_soname at 0x26e2050>
	                self = <entropy.qa.QAInterface object at 0x6b6a150>
	      broken_matches = set([])
	     package_matches = [(265, u'spike')]
	     system_packages = set([(10201, '__system__'), (14438, '__system__'), (12787, '__system__'), (10385, '__system__'), (10071, '__system__'), (11317, '__system__'), (14488, '__system__'), (11087, '__system__'), (12876, '__system__'), (14444, '__system__'), (10208, '__system__'), (14670, '__system__'), (14619, '__system__'), (10367, '__system__'), (15153, '__system__'), (11638, '__system__'), (10819, '__system__'), (13036, '__system__'), (11082, '__system__'), (69, u'spike'), (15086, '__system__'), (12953, '__system__'), (14623, '__system__'), (11256, '__system__'), (14394, '__system__'), (15427, '__system__'), (13470, '__system__'), (15433, '__system__'), (11378, '__system__'), (10327, '__system__'), (11693, '__system__'), (10902, '__system__'), (13795, '__system__'), (12993, '__system__'), (10904, '__system__'), (11805, '__system__'), (10942, '__system__'), (10484, '__system__'), (13903, '__system__'), (13512, '__system__'), (10926, '__system__'), (12845, '__system__')])
	          package_id = 265
	              s_repo = <EntropySQLiteRepository instance at 0x2665f90, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: True|True, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>
	      entropy_client = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	                atom = u'net-analyzer/metasploit-9999'
	        s_package_id = 69
	           s_repo_id = u'spike'
	               repos = ['__system__', u'spike']
	              dbconn = <EntropySQLiteRepository instance at 0x2665f90, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: True|True, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>

Frame _get_unresolved_sonames in /usr/lib/entropy/lib/entropy/qa.py at line 1236
	  entropy_repository = <EntropySQLiteRepository instance at 0x2665f90, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: True|True, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>
	         pkg_matches = set([(220, u'spike'), (23, u'spike'), (208, u'spike'), (24, u'spike'), (241, u'spike'), (32, u'spike')])
	   provided_libs_set = set([])
	            elf_file = u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_stdapi.lso'
	          package_id = 265
	              pkg_id = 32
	resolved_soname_path = None
	       repository_id = u'spike'
	                self = <entropy.qa.QAInterface object at 0x6b6a150>
	            pkg_repo = u'spike'
	       resolve_cache = {'ld-elf.so.1': None, 'libc.so.7': None}
	               ftype = u'obj'
	  unresolved_sonames = {u'/usr/lib64/metasploit9999/data/exploits/CVE-2013-2171.bin': set(['ld-elf.so.1', 'libc.so.7'])}
	      entropy_client = <entropy.server.interfaces.main.Server object at 0xdc4fd0>
	              soname = 'ld-elf.so.1'
	       package_match = (265, u'spike')
	           elf_files = deque([u'/usr/lib64/metasploit9999/data/templates/template_mipsbe_linux.bin', u'/usr/lib64/metasploit9999/data/exploits/CVE-2013-2171.bin', u'/usr/lib64/metasploit9999/data/templates/template_x86_linux.bin', u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_stdapi.lso', u'/usr/lib64/metasploit9999/data/templates/template_armle_linux.bin', u'/usr/lib64/metasploit9999/data/templates/template_x86_solaris.bin', u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_sniffer.lso', u'/usr/lib64/metasploit9999/data/templates/template_x86_bsd.bin', u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_networkpug.lso', u'/usr/lib64/metasploit9999/data/templates/template_x64_linux.bin'])
	                repo = <EntropySQLiteRepository instance at 0x2665f90, /var/lib/entropy/server/spike/database/amd64/5/packages.db, ro: True|True, caching: False, indexing: True, name: spike, skip_upd: False, conn_pool: {}, cursor_cache: {}>
	        dependencies = set([u'dev-ruby/rb-readline[ruby_targets_ruby19]', u'>=app-crypt/johntheripper-1.7.9-r1[-minimal]', u'dev-ruby/msgpack[ruby_targets_ruby19]', u'dev-ruby/pcaprub[ruby_targets_ruby19]', u'dev-ruby/network_interface[ruby_targets_ruby19]', u'dev-ruby/rjb[ruby_targets_ruby19]', u'>=app-admin/eselect-metasploit-0.10'])
	                path = u'/usr/lib64/metasploit9999/data/templates/scripts/to_mem.aspx.template'
	        content_root = ''
	                 obj = set(['ld-elf.so.1', 'libc.so.7'])
	           real_path = u'/usr/lib64/metasploit9999/data/templates/scripts/to_mem.aspx.template'
	          dependency = u'>=app-admin/eselect-metasploit-0.10'
	       match_repo_id = u'spike'
	        match_pkg_id = 220
	             sonames = set([])

Frame read_elf_real_dynamic_libraries in /usr/lib/entropy/lib/entropy/tools.py at line 2755
	            elf_file = u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_stdapi.lso'
	             exit_st = 1
	                args = ('/usr/bin/lddtree', '-l', u'/usr/lib64/metasploit9999/data/meterpreter/ext_server_stdapi.lso')
	                proc = <subprocess.Popen object at 0x915bf10>
	                 out = None
Have anyone experience with this kind of eit errors?
Could you help me to fix this?

lxnay
Land Owner
Posts: 3596
Joined: Thu Oct 13, 2005 23:16
Location: Italy
Contact:

Re: Eit problems

Post by lxnay » Thu Apr 03, 2014 10:21

What version are you using? This should have been fixed a couple of weeks ago already. See this.
Image
Join us on IRC (chat.freenode.net #sabayon or WebChat)
Submit bugs to our Bug Tracker
Follow me on Twitter
Add me on Facebook
Add me on Google+

skullbocks
Baby Hen
Posts: 19
Joined: Sun Dec 24, 2006 11:53

Re: Eit problems

Post by skullbocks » Thu Apr 03, 2014 11:36

I have installed:

Code: Select all

[I] sys-apps/entropy-276
[I] sys-apps/entropy-server-276
I saw the code in the attached commit and I already have that changes in qa.py, but the problem is still here.

lxnay
Land Owner
Posts: 3596
Joined: Thu Oct 13, 2005 23:16
Location: Italy
Contact:

Re: Eit problems

Post by lxnay » Thu Apr 03, 2014 11:59

Fixed here
Image
Join us on IRC (chat.freenode.net #sabayon or WebChat)
Submit bugs to our Bug Tracker
Follow me on Twitter
Add me on Facebook
Add me on Google+

skullbocks
Baby Hen
Posts: 19
Joined: Sun Dec 24, 2006 11:53

Re: Eit problems

Post by skullbocks » Thu Apr 03, 2014 13:53

Ok that fixed the problem and the add work now but it still give me this output:

Code: Select all

/usr/bin/lddtree: warning: /usr/lib64/metasploit4.8/data/meterpreter/ext_server_sniffer.lso: Magic number does not match
/usr/bin/lddtree: warning: /usr/lib64/metasploit4.8/data/meterpreter/ext_server_stdapi.lso: Magic number does not match
/usr/bin/lddtree: warning: /usr/lib64/metasploit4.8/data/meterpreter/ext_server_networkpug.lso: Magic number does not match
[OT]
There is a flag to set the sync directory of eit or to limit the size of this directory?
Because this tool take me a lot of disk space in var when it downloads a copy of entire repo in my local machine.

lxnay
Land Owner
Posts: 3596
Joined: Thu Oct 13, 2005 23:16
Location: Italy
Contact:

Re: Eit problems

Post by lxnay » Fri Apr 04, 2014 10:37

You can ignore the warnings.
Development tools take a lot of space at times, live with it.
Image
Join us on IRC (chat.freenode.net #sabayon or WebChat)
Submit bugs to our Bug Tracker
Follow me on Twitter
Add me on Facebook
Add me on Google+

skullbocks
Baby Hen
Posts: 19
Joined: Sun Dec 24, 2006 11:53

Re: Eit problems

Post by skullbocks » Fri Apr 04, 2014 15:05

So to move the packet directory I must make a link to the directory in another partition/HD or modfy the code. am I right?

Post Reply