-
Notifications
You must be signed in to change notification settings - Fork 14.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
`require': cannot load such file -- robots (LoadError) #6068
Comments
This is a small bug in one of the gems that framework depends on. If you use one of the prepackaged installs, e.g. Kali Linux or the Omnibus installer, this is worked around already. Otherwise, you simply need change permissions on a single file so it can be read by a non-root user. Here's a hint: https://github.com/rapid7/metasploit-omnibus/blob/master/config/software/metasploit-framework.rb#L73 Edit - this was pointing to the wrong line. |
Also recommend updating your Ruby version. We're on 2.1.6 now. |
On Ruby 2.1.7 now, for what it's worth. Versions move fast! |
Please update your ruby version, and Setting-Up-a-Metasploit-Development-Environment is helpful. |
Thanks. I return kali from ubuntu vivid. |
I've patched this issue in the dependency in fizx/robots#10 but I'm not sure if it'll get merged into upstream. |
Thanks for the upstream fix @Romulus10, I left a note there. |
Update your metaspot framework to the latest version. That overpacks on the current version and the metaspot should work fine as usual after the update. |
Ruby Version: ruby 2.1.2p95 (2014-05-08) [x86_64-linux-gnu]
/home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework.rb:19:in
'require': cannot load such file -- robots (LoadError) from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework.rb:19:in
<top (required)>'from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/database.rb:1:in
require' from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/database.rb:1:in
<top (required)>'from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/parsed_options/base.rb:17:in
require' from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/parsed_options/base.rb:17:in
<top (required)>'from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/parsed_options/console.rb:2:in
<top (required)>' from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/inflector/methods.rb:228:in
const_get'from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/inflector/methods.rb:228:in
block in constantize' from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/inflector/methods.rb:224:in
each'from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/inflector/methods.rb:224:in
inject' from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/inflector/methods.rb:224:in
constantize'from /var/lib/gems/2.1.0/gems/activesupport-4.0.13/lib/active_support/core_ext/string/inflections.rb:66:in
constantize' from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:73:in
parsed_options_class'from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:69:in
parsed_options' from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:47:in
require_environment!'from /home/czsr/Pentest/exploits/metasploit-framework/lib/metasploit/framework/command/base.rb:81:in
start' from ./msfconsole:48:in
The text was updated successfully, but these errors were encountered: