Closed willemkuijpers closed 2 years ago
Devices found: ['00008101-000004160A51003A'] Devices: ['00008101-000004160A51003A']
scanning_device ios 00008101-000004160A51003A <<<<< idevicepair pair DUMPING iOS INFO... '/home/ironx/isdi/scripts/ios_dump.sh' b750fda36116af23c856d3cb19141edb9122a7e69abd9842cd6761df20b4a6f6 ios_apps.plist ios_info.xml ios_jailbroken.log ios_jailbreak_ssh.retcode '/home/ironx/isdi/scripts/ios_dump.sh' b750fda36116af23c856d3cb19141edb9122a7e69abd9842cd6761df20b4a6f6 ios_apps.plist ios_info.xml ios_jailbroken.log ios_jailbreak_ssh.retcode Returncode: 0
This will be resolved with https://github.com/stopipv/isdi/pull/24
Closed by merging in #24
ImportError
ImportError: cannot import name 'readPlist' from 'plistlib' (/usr/lib/python3.9/plistlib.py) Traceback (most recent call last)
The debugger caught an exception in your WSGI application. You can now look at the traceback which led to the error.
To switch between the interactive traceback and the plaintext one, you can click on the "Traceback" headline. From the text traceback you can also create a paste of it. For code execution mouse-over the frame you want to debug and click on the console icon on the right side.
You can execute arbitrary Python code in the stack frames and there are some extra helpers available for introspection:
Brought to you by DON'T PANIC, your friendly Werkzeug powered traceback interpreter.