server:
$ xpra version xpra for python 2.7 is not installed retrying with python3 3.0-r23724 $ lsb_release -rd Description: Ubuntu 16.04.6 LTS Release: 16.04
client:
Windows 10 Xpra GTK3 client version 3.0-r23770 64-bit Xpra-Python3-x86_64_3.0-r23770\xpra_cmd" start ssh://user@ip/2 --opengl=no --start-new-commands=yes --microphone=off --speaker=off --webcam=no --pulseaudio=no --start=gnome-terminal
I have started a gnome-terminal
, and from that I have started this https://community.microfocus.com/t5/Identity-Manager-Tips/Jarek-Gawor-s-excellent-LDAP-Browser-Editor-v2-8-2/ta-p/1771772.
After I connect to an LDAP server, it returns:
2019-09-27 14:06:25,252 Error 'not enough values to unpack (expected 8, got 0)' processing eos packet Traceback (most recent call last): File "E:\Xpra\trunk\src/xpra/client/mixins/window_manager.py", line 1380, in _draw_thread_loop File "E:\Xpra\trunk\src/xpra/client/mixins/window_manager.py", line 1394, in _do_draw ValueError: not enough values to unpack (expected 8, got 0)
I know it's not open-source, but replication is very easy if you can bind to any LDAP.
There are no visual issues that I can see.
That's fixed in r23997. 'eos' packets trigger whenever we stop sending using a video codec, so it should be easy to trigger with many other applications.
Now, to be able to hit this bug, I believe that you need a very specific combination:
How can that be? I'm pretty sure that all win32 builds have rencode builtin.
And python3-rencode
should have been pulled in as a dependency of python3-xpra
.
So unless you deliberately turned it off on the server command line, it should be available at both ends.
Can you post the output on the server of: python3 ./xpra/net/net_util.py
?
I have it on the server :/
Network interfaces found: * lo (index=1) * IPv4: 127.0.0.1 * IPv6: ::1 * eth0 (index=2) * IPv4: 172.16.57.121 {'driver': 'e1000e', 'bus-info': '0000:00:1f.6', 'firmware-version': '0.8-4', 'speed': 1000000000, 'version': '3.2.6-k'} * IPv6: fe80::f745:ce1a:5ee8:6a3e%eth0 {'driver': 'e1000e', 'bus-info': '0000:00:1f.6', 'firmware-version': '0.8-4', 'speed': 1000000000, 'version': '3.2.6-k'} * vmnet1 (index=3) * IPv4: 172.16.194.1 no ethtool interface speed available for vmnet1[0m no driver information for vmnet1[0m * IPv6: fe80::250:56ff:fec0:1%vmnet1 no driver information for vmnet1[0m * vmnet8 (index=4) * IPv4: 192.168.155.1 no ethtool interface speed available for vmnet8[0m no driver information for vmnet8[0m * IPv6: fe80::250:56ff:fec0:8%vmnet8 no driver information for vmnet8[0m Gateways found: Protocol Capabilities: * bencode : True - version : Cython, 3.0 * brotli : True - version : 1.0.4 * compressors : zlib, lz4, brotli * digest : xor, hmac, hmac+whirlpool, hmac+sha512, hmac+sha384, hmac+sha256, hmac+sha224, hmac+sha1, hmac+sha, hmac+ripemd160, hmac+md5, hmac+md4, hmac+ecdsa-with-SHA1, hmac+dsaWithSHA, hmac+dsaEncryption, hmac+SHA512, hmac+SHA384, hmac+SHA256, hmac+SHA224, hmac+SHA1, hmac+SHA, hmac+RIPEMD160, hmac+MD5, hmac+MD4, hmac+DSA-SHA, hmac+DSA, des * encoders : rencode, bencode * lz4 : True - version : 0.11.1 * lzo : False * mmap : True * netifaces : True - version : 0.10.4 * python-lz4 : True - version : 0.11.1 * rencode : True - version : Cython, 1.0.3 * salt-digest : hmac+whirlpool, hmac+sha512, hmac+sha384, hmac+sha256, hmac+sha224, hmac+sha1, hmac+sha, hmac+ripemd160, hmac+md5, hmac+md4, hmac+ecdsa-with-SHA1, hmac+dsaWithSHA, hmac+dsaEncryption, hmac+SHA512, hmac+SHA384, hmac+SHA256, hmac+SHA224, hmac+SHA1, hmac+SHA, hmac+RIPEMD160, hmac+MD5, hmac+MD4, hmac+DSA-SHA, hmac+DSA * yaml : False * zlib : True - version : 1.0 Network Config: * socket.timeout : 20 * vsocket.timeout : 5 Network System Config: * core - busy_poll : 0 - busy_read : 0 - default_qdisc : pfifo_fast - max_skb_frags : 17 - netdev_max_backlog : 10000 - optmem_max : 20480 - rmem_default : 212992 - rmem_max : 212992 - somaxconn : 128 - wmem_default : 212992 - wmem_max : 212992 * ipv4 - fwmark_reflect : True - icmp - echo_ignore_all : True - echo_ignore_broadcasts : True - errors_use_inbound_ifaddr : 0 - ignore_bogus_error_responses : 1 - msgs_burst : 50 - msgs_per_sec : 1000 - ratelimit : 1000 - ratemask : 6168 - igmp - max_memberships : 20 - max_msf : 10 - qrv : 2 - ip - default_ttl : 64 - dynaddr : True - early_demux : True - forward : True - forward_use_pmtu : True - local_port_range : 32768, 60999 - local_reserved_ports : () - no_pmtu_disc : 0 - nonlocal_bind : True - ipfrag - high_thresh : 262144 - low_thresh : 196608 - max_dist : 64 - time : 30 - route - min_adv_mss : 256 - min_pmtu : 552 - mtu_expires : 600 - tcp - abort_on_overflow : True - adv_win_scale : 1 - allowed_congestion_control : reno cubic - app_win : 31 - autocorking : True - available_congestion_control : reno cubic - base_mss : 1024 - challenge_ack_limit : 1000 - congestion_control : cubic - dsack : True - early_retrans : 3 - ecn : 2 - ecn_fallback : True - fack : True - fastopen : 1 - fin_timeout : 60 - frto : 2 - invalid_ratelimit : 500 - keepalive_intvl : 75 - keepalive_probes : 9 - keepalive_time : 7200 - limit_output_bytes : 262144 - low_latency : True - max_orphans : 262144 - max_reordering : 300 - max_syn_backlog : 2048 - max_tw_buckets : 262144 - mem : 767064, 1022754, 1534128 - min_rtt_wlen : 300 - min_tso_segs : 2 - moderate_rcvbuf : 1 - mtu_probing : 0 - no_metrics_save : True - notsent_lowat : 4294967295 - orphan_retries : 0 - pacing_ca_ratio : 120 - pacing_ss_ratio : 200 - probe_interval : 600 - probe_threshold : 8 - recovery : True - reordering : 3 - retrans_collapse : True - retries1 : 3 - retries2 : 15 - rfc1337 : 0 - rmem : 4096, 87380, 6291456 - sack : 1 - slow_start_after_idle : 1 - stdurg : 0 - syn_retries : 6 - synack_retries : 5 - syncookies : 1 - thin_linear_timeouts : True - timestamps : True - tso_win_divisor : 3 - tw_reuse : 0 - window_scaling : 1 - wmem : 4096, 16384, 4194304 - workaround_signed_windows : True * unix - max_dgram_qlen : 512 SSL: * alpn : True * channel-binding-types : tls-unique * ecdh : True * npn : True * openssl - version : OpenSSL 1.0.2g 1 Mar 2016 - version-info : (1, 0, 2, 7, 15) - version-number : 268443775 * options - OP_ALL : 2147484671 - OP_CIPHER_SERVER_PREFERENCE : 4194304 - OP_NO_COMPRESSION : 131072 - OP_NO_SSLv2 : 16777216 - OP_NO_SSLv3 : 33554432 - OP_NO_TLSv1 : 67108864 - OP_NO_TLSv1_1 : 268435456 - OP_NO_TLSv1_2 : 134217728 - OP_SINGLE_DH_USE : 1048576 - OP_SINGLE_ECDH_USE : 524288 * protocols - PROTOCOL_SSLv23 : 2 - PROTOCOL_TLSv1 : 3 - PROTOCOL_TLSv1_1 : 4 - PROTOCOL_TLSv1_2 : 5 * sni : True * verify - VERIFY_CRL_CHECK_CHAIN : 12 - VERIFY_CRL_CHECK_LEAF : 4 - VERIFY_DEFAULT : 0 - VERIFY_X509_STRICT : 32 - VERIFY_X509_TRUSTED_FIRST : 32768 Crypto Capabilities: * backend : python-cryptography * padding - options : PKCS#7, legacy * python-cryptography : True - version : 2.1.3
I'm still not sure about how you managed to hit this bug, but since it is fixed.. closing.
this ticket has been moved to: https://github.com/Xpra-org/xpra/issues/2427