Your message dated Sat, 01 Sep 2007 20:47:08 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#429355: fixed in python-openid 2.0.1-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: python-openid Version: 2.0.0-1 Severity: normal Tags: patch Hi, I found two bugs in example server. I launch the server and client as described in the readme file of the example directory. I enter the id in the client which redirect to the server. The server ask for allow authentication but when I agree, it retruns a traceback : /tmp/server.py in addSRegResponse(self=<__main__.ServerHandler instance>, response=<openid.server.server.OpenIDResponse object>) 193 else: 194 response = self.server.openid.handleRequest(request) 195 self.displayResponse(response) 196 197 def addSRegResponse(self, response): 198 sreg_req = sreg.SRegRequest.fromOpenIDRequest(request.message) 199 200 # In a real application, this data would be user-specific, 201 # and the user should be asked for permission to release 202 # it. sreg_req undefined, global sreg = <module 'openid.sreg' from '/usr/lib/python2.4/site-packages/openid/sreg.pyc'>, sreg.SRegRequest = <class 'openid.sreg.SRegRequest'>, sreg.SRegRequest.fromOpenIDRequest = <bound method type.fromOpenIDRequest of <class 'openid.sreg.SRegRequest'>>, request undefined NameError: global name 'request' is not defined args = ("global name 'request' is not defined",) I correct it in path1. With my new server.py, I tried to use the option for remembering authentification but it has no effect. I correct it in path2. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.18-4-686 (SMP w/1 CPU core) Locale: LANG=fr_FR, LC_CTYPE=fr_FR (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages python-openid depends on: ii python 2.4.4-6 An interactive high-level object-o ii python-central 0.5.14 register and build utility for Pyt ii python-urljr 1.0.1-1 Common interface to urllib2 and cu ii python-yadis 1.1.0-1 Yadis service discovery library python-openid recommends no packages. -- no debconf information--- server.py.old 2007-06-17 13:49:12.000000000 +0200 +++ server.py 2007-06-17 13:50:07.000000000 +0200 @@ -194,8 +194,8 @@ response = self.server.openid.handleRequest(request) self.displayResponse(response) - def addSRegResponse(self, response): - sreg_req = sreg.SRegRequest.fromOpenIDRequest(request.message) + def addSRegResponse(self, response, request): + sreg_req = sreg.SRegRequest.fromOpenIDRequest(request) # In a real application, this data would be user-specific, # and the user should be asked for permission to release @@ -209,7 +209,7 @@ def approved(self, request, identifier=None): response = request.answer(True, identity=identifier) - self.addSRegResponse(response) + self.addSRegResponse(response, request) return response def handleCheckIDRequest(self, request):--- server.py.old 2007-06-17 13:52:41.000000000 +0200 +++ server.py 2007-06-17 13:53:31.000000000 +0200 @@ -170,7 +170,7 @@ if self.user is None: return False - if identity_url != self.server.base_url + self.user: + if identity_url != self.server.base_url + 'id/' + self.user: return False key = (identity_url, trust_root)
--- End Message ---
--- Begin Message ---Source: python-openid Source-Version: 2.0.1-1 We believe that the bug you reported is fixed in the latest version of python-openid, which is due to be installed in the Debian FTP archive: python-openid_2.0.1-1.diff.gz to pool/main/p/python-openid/python-openid_2.0.1-1.diff.gz python-openid_2.0.1-1.dsc to pool/main/p/python-openid/python-openid_2.0.1-1.dsc python-openid_2.0.1-1_all.deb to pool/main/p/python-openid/python-openid_2.0.1-1_all.deb python-openid_2.0.1.orig.tar.gz to pool/main/p/python-openid/python-openid_2.0.1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mikhail Gusarov <[EMAIL PROTECTED]> (supplier of updated python-openid package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 04 Jul 2007 14:06:56 +0700 Source: python-openid Binary: python-openid Architecture: source all Version: 2.0.1-1 Distribution: unstable Urgency: low Maintainer: Mikhail Gusarov <[EMAIL PROTECTED]> Changed-By: Mikhail Gusarov <[EMAIL PROTECTED]> Description: python-openid - OpenID support for servers and consumers Closes: 429355 429628 429630 430620 434536 Changes: python-openid (2.0.1-1) unstable; urgency=low . * New upstream release (Closes: #430620) - Example Django server fixed(Closes: #429355, #429628). * Rebuilding package to get .egg information (Closes: #434536). * Do not compress examples, they are executable python code (Closes: #429630). * epydoc documentation moved to html/ subdir to avoid polluting top-level directory. Files: 51e73d3b60ebbfe72ba31f9b60166490 773 python optional python-openid_2.0.1-1.dsc 1a6c9792a641c023deae35a437175203 674909 python optional python-openid_2.0.1.orig.tar.gz 8e4eef5ce7e30bb28e5fbaf1413ffc49 1904 python optional python-openid_2.0.1-1.diff.gz 0d288bf9b878e52fcb5d70c6ed662d71 550116 python optional python-openid_2.0.1-1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG2cM+01u8mbx9AgoRAu1zAJ9sVP2/KlPNWZdXEMJpjC3AAkV4TQCbBz67 rk3h+u/nHQirIH/TLq9zghs= =bff2 -----END PGP SIGNATURE-----
--- End Message ---

