SandboxViolation: mkdir('/usr/lib/python2.7/site-packages/cryptography/hazmat/bindings/__pycache__', 511) {} #2217
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#2217
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Oookay. Let's see… possibly related to http://bugs.python.org/setuptools/issue23 which was ported into Distribute in https://bitbucket.org/tarek/distribute/issue/13 . Your "show-tool-versions" output from a previous bug report ((@@https://tahoe-lafs.org/trac/tahoe-lafs/ticket/2216#comment:-1@@)) indicates that you have "setuptools: [0.6.36 (/usr/share/python2.7/site-packages)]distribute". So, I wonder if distribute 0.6.36 has the patch from https://bitbucket.org/tarek/distribute/issue/13 ?
Build error with Nevowto SandboxViolation: mkdir('/usr/lib/python2.7/site-packages/cryptography/hazmat/bindings/__pycache__', 511) {}Hm, yeah, according to https://bitbucket.org/tarek/distribute/src/3bf82d0cbc6e0a6d383f177c4def1222f3c3ba46/CHANGES.txt?at=default that should have been fixed as far back as Distribute 0.6. So I guess it isn't exactly that. Maybe we could open a new ticket on Distribute?
Hm, you know, that error message actually seems kind of legit:
Did you authorize some process to write into your system directories (e.g.
/usr/lib/python2.7/site-packages/
) when you ran the command that resulted in the above error message? What was that command? Could you please paste in the command and the entire output from it?Despite appearances, I think this has nothing to do with Nevow; it's just that there isn't a clear boundary in the output between building Nevow, and building cryptography.
Ah, possibly the reason why this appears in the Nevow build section is that cryptography is a dependency of pyOpenSSL (>= 0.14), which is a dependency of Twisted, which is a dependency of Nevow.
daira: I really feel like we should require pyOpenSSL <= 0.13 until this whole CFFI thing has been more worked out.
okay, in that case we need exactly pyOpenSSL==0.13
because the API to get the OpenSSL version [order to fix #2215]in was only added in 0.13
[...]
note that this line will need to be changed to include pyOpenSSL:
https://tahoe-lafs.org/trac/tahoe-lafs/browser/trunk/setup.py#L134
it should be:
setup_requires += [for req in install_requires if req.startswith('Twisted') or req.startswith('pyOpenSSL') or req.startswith('zope.interface')]req
otherwise setuptools/distribute might attempt to satisfy the setup-time dependency of Nevow->Twisted->pyOpenSSL using pyOpenSSL >= 0.14
Judging from https://twistedmatrix.com/trac/browser/trunk/setup.py, Twisted doesn't currently depend on pyOpenSSL.
Replying to zooko:
So it doesn't. Then I'm confused: why wasn't there any output between the building of Nevow and the error due to attempting to build cryptography?
Oh! I bet the thing that is failing is the generation of cffi bindings. But then how does installing (as opposed to building) a package with cffi bindings using setuptools ever work?
Replying to zooko:
aredridel, we really need this information in order to progress further with this bug.
Complete output including command:
This is as an unprivileged user, without write access to the system install locations.
Thanks.
It's possible that using a more recent version of setuptools at build time would help (#2044).
It has to do with cffi, so a sufficient work-around for this, and probably many other issues, is to limit our dependency on pyOpenSSL to be ≤ 0.13. (Because pyOpenSSL v0.13 didn't use cffi and the cryptography.io library and many other things.)
aredridel: would you be so kind as to try this for us? You'd need to patch your Tahoe-LAFS source distribution by editing source:src/allmydata/_auto_deps.py and change
"pyOpenSSL"
to"pyOpenSSL <= 0.13"
.Hm. No dice. I started from a clean unpack of
allmydata-tahoe-1.10.0
, changed"pyOpenSSL"
to"pyOpenSSL <= 0.13"
and got this:Replying to aredridel:
Hmm. It's not clear what would have happened had the setuptools sandbox not prevented the access; i.e. whether it would have failed anyway due to lack of OS-level file permissions, or whether cffi would have fallen back to just not using the cache.
The fact that this still happens with
pyOpenSSL <= 0.13
as the requirement is really confusing. I don't know what else could be depending oncryptography
.Yeah, I wonder if aredridel accidentally built a copy that didn't have the pyOpenSSL dependency fixed to <= 0.13? Because other than pyOpenSSL 0.14, I don't think anything else depends on the cryptography.io library.
Here is a way to find out what package(s) depend on the cryptography library:
That should print out all the packages that
"pyOpenSSL <= 0.13"
depends on. You can also do the same thing for the other packages from [src/allmydata/_auto_deps.py]source:trunk/src/allmydata/_auto_deps.py?annotate=blame&rev=7bb07fb5e28756fa13ba5190e6c39003c84d3e1e, like this:and
I'd guess that Twisted and foolscap are two other libraries that might somehow depend on the "cryptography.io" library.
Replying to aredridel:
Urrrrgh. Okay, this explains it. I think. Actually only partially. The thing is, this appears to be saying that you already have pyOpenSSL 0.14 installed in your system. Okay, fine, that explains why builds of the cryptography.io library/hazmat library are triggered when you build Tahoe-LAFS. Except, actually it totally doesn't because:
Why is it trying to write a cache file into your read-only system-wide filesystem if it is already installed?
Why is it doing anything with pyOpenSSL 0.14 when we've already specified that pyOpenSSL 0.14 is unacceptable for our version requirements?
Sigh, okay, so this suggests a workaround that you can do: remove pyOpenSSL (0.14) from your system and see if that gets past your problem. However, I will feel guilty if we do not report these issues to someone who can do something about them, to help the next user who comes after you. I'm not 100% sure who that would be, though. Who can do something about Python packaging madness? ☹
Okay I asked dstufft and others on IRC and I think I understand answers to these:
Replying to [zooko]comment:23:
I suspect that this is because cffi tries to build hazmat as a side-effect of someone trying to import pyOpenSSL.
I suspect that this is because pkg_resources tries to import "OpenSSL" as a side-effect of trying to check what version(s) of pyOpenSSL are available.
aridredel: please go ahead and remove pyOpenSSL 0.14 from your system, and test the patch with
"pyOpenSSL <= 0.13"
. Thank you very much for your help!Replying to [zooko]comment:24:
They intend to change cffi for the upcoming cffi v1.0 to stop doing this -- doing "build" stuff automatically at import-time: https://groups.google.com/d/msg/python-cffi/L9ngHcpRJMU/7Y3CrZg-tn0J
coming up!
And Huzzah! Success!
Replying to [zooko]comment:25:
Here's a ticket to track the progress of that change to cffi: https://bitbucket.org/cffi/cffi/issue/109/enable-sane-packaging-for-cffi
Yay! Thank you for your help.
(https://bitbucket.org/cffi/cffi/issue/149/sandboxviolation-mkdir-usr-lib-python27)
Replying to [zooko]comment:24:
No, the
OpenSSL
module is not imported at build time. (It would be easy to verify this.) TheOpenSSL
package is certainly imported by Tahoe-LAFS code at run-time (quite early, in order to check the version). I suspect it's because cffi installs some hook that is invoked when a package depending on it is built. But if that hook attempts to write to system areas of the filesystem, it is just completely broken and cannot work for builds done as an unprivileged user.