Your message dated Sat, 01 Sep 2007 20:47:08 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#429355: fixed in python-openid 2.0.1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: python-openid
Version: 2.0.0-1
Severity: normal
Tags: patch

Hi,

I found two bugs in example server.

I launch the server and client as described in the readme file of the
example directory. I enter the id in the client which redirect to the
server. The server ask for allow authentication but when I agree, it
retruns a traceback : 

/tmp/server.py in addSRegResponse(self=<__main__.ServerHandler instance>, 
response=<openid.server.server.OpenIDResponse object>)
  193         else:
  194             response = self.server.openid.handleRequest(request)
  195             self.displayResponse(response)
  196 
  197     def addSRegResponse(self, response):
  198         sreg_req = sreg.SRegRequest.fromOpenIDRequest(request.message)
  199 
  200         # In a real application, this data would be user-specific,
  201         # and the user should be asked for permission to release
  202         # it.
sreg_req undefined, global sreg = <module 'openid.sreg' from 
'/usr/lib/python2.4/site-packages/openid/sreg.pyc'>, sreg.SRegRequest = <class 
'openid.sreg.SRegRequest'>, sreg.SRegRequest.fromOpenIDRequest = <bound method 
type.fromOpenIDRequest of <class 'openid.sreg.SRegRequest'>>, request undefined

NameError: global name 'request' is not defined
      args = ("global name 'request' is not defined",)

I correct it in path1.

With my new server.py, I tried to use the option for remembering
authentification but it has no effect. I correct it in path2.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-4-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR, LC_CTYPE=fr_FR (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages python-openid depends on:
ii  python                        2.4.4-6    An interactive high-level object-o
ii  python-central                0.5.14     register and build utility for Pyt
ii  python-urljr                  1.0.1-1    Common interface to urllib2 and cu
ii  python-yadis                  1.1.0-1    Yadis service discovery library

python-openid recommends no packages.

-- no debconf information
--- server.py.old       2007-06-17 13:49:12.000000000 +0200
+++ server.py   2007-06-17 13:50:07.000000000 +0200
@@ -194,8 +194,8 @@
             response = self.server.openid.handleRequest(request)
             self.displayResponse(response)
 
-    def addSRegResponse(self, response):
-        sreg_req = sreg.SRegRequest.fromOpenIDRequest(request.message)
+    def addSRegResponse(self, response, request):
+        sreg_req = sreg.SRegRequest.fromOpenIDRequest(request)
 
         # In a real application, this data would be user-specific,
         # and the user should be asked for permission to release
@@ -209,7 +209,7 @@
 
     def approved(self, request, identifier=None):
         response = request.answer(True, identity=identifier)
-        self.addSRegResponse(response)
+        self.addSRegResponse(response, request)
         return response
 
     def handleCheckIDRequest(self, request):
--- server.py.old       2007-06-17 13:52:41.000000000 +0200
+++ server.py   2007-06-17 13:53:31.000000000 +0200
@@ -170,7 +170,7 @@
         if self.user is None:
             return False
 
-        if identity_url != self.server.base_url + self.user:
+        if identity_url != self.server.base_url + 'id/' + self.user:
             return False
 
         key = (identity_url, trust_root)

--- End Message ---
--- Begin Message ---
Source: python-openid
Source-Version: 2.0.1-1

We believe that the bug you reported is fixed in the latest version of
python-openid, which is due to be installed in the Debian FTP archive:

python-openid_2.0.1-1.diff.gz
  to pool/main/p/python-openid/python-openid_2.0.1-1.diff.gz
python-openid_2.0.1-1.dsc
  to pool/main/p/python-openid/python-openid_2.0.1-1.dsc
python-openid_2.0.1-1_all.deb
  to pool/main/p/python-openid/python-openid_2.0.1-1_all.deb
python-openid_2.0.1.orig.tar.gz
  to pool/main/p/python-openid/python-openid_2.0.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mikhail Gusarov <[EMAIL PROTECTED]> (supplier of updated python-openid package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 04 Jul 2007 14:06:56 +0700
Source: python-openid
Binary: python-openid
Architecture: source all
Version: 2.0.1-1
Distribution: unstable
Urgency: low
Maintainer: Mikhail Gusarov <[EMAIL PROTECTED]>
Changed-By: Mikhail Gusarov <[EMAIL PROTECTED]>
Description: 
 python-openid - OpenID support for servers and consumers
Closes: 429355 429628 429630 430620 434536
Changes: 
 python-openid (2.0.1-1) unstable; urgency=low
 .
   * New upstream release (Closes: #430620)
     - Example Django server fixed(Closes: #429355, #429628).
   * Rebuilding package to get .egg information (Closes: #434536).
   * Do not compress examples, they are executable python code
     (Closes: #429630).
   * epydoc documentation moved to html/ subdir to avoid polluting
     top-level directory.
Files: 
 51e73d3b60ebbfe72ba31f9b60166490 773 python optional python-openid_2.0.1-1.dsc
 1a6c9792a641c023deae35a437175203 674909 python optional 
python-openid_2.0.1.orig.tar.gz
 8e4eef5ce7e30bb28e5fbaf1413ffc49 1904 python optional 
python-openid_2.0.1-1.diff.gz
 0d288bf9b878e52fcb5d70c6ed662d71 550116 python optional 
python-openid_2.0.1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG2cM+01u8mbx9AgoRAu1zAJ9sVP2/KlPNWZdXEMJpjC3AAkV4TQCbBz67
rk3h+u/nHQirIH/TLq9zghs=
=bff2
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to