login page errors
scott stensland
scottstensland at gmail.com
Sun Nov 26 16:56:24 UTC 2017
Hello kde wiki crew
getting below error when I click on
Login
on your page
https://wiki.kubuntu.org/Kubuntu/GettingInvolved/Development?action=login
which takes me to page
https://wiki.kubuntu.org/Kubuntu?action=login&login=1&oidstage=1&stage=openid&janrain_nonce=2017-11-26T16%253A53%253A42ZX7x1M2&openid.assoc_handle=%257BHMAC-SHA1%257D%257B5a1aeaea%257D%257Bgx2ruw%253D%253D%257D&openid.claimed_id=https%253A%252F%252Flogin.ubuntu.com%252F%252Bid%252FmGHCLLk&openid.identity=https%253A%252F%252Flogin.ubuntu.com%252F%252Bid%252FmGHCLLk&openid.lp.is_member=&openid.mode=id_res&openid.ns=http%253A%252F%252Fspecs.openid.net%252Fauth%252F2.0&openid.ns.lp=http%253A%252F%252Fns.launchpad.net%252F2007%252Fopenid-teams&openid.ns.sreg=http%253A%252F%252Fopenid.net%252Fextensions%252Fsreg%252F1.1&openid.op_endpoint=https%253A%252F%252Flogin.ubuntu.com%252F%252Bopenid&openid.response_nonce=2017-11-26T16%253A53%253A45ZGt1PhU&openid.return_to=http%253A%252F%252Fwiki.kubuntu.org%252F%253Faction%253Dlogin%2526login%253D1%2526oidstage%253D1%2526stage%253Dopenid%2526janrain_nonce%253D2017-11-26T16%25253A53%25253A42ZX7x1M2&openid.sig=Y8NHFc0asQk2ORfv5tkn7fWtmdw%253D&openid.signed=assoc_handle%252Cclaimed_id%252Cidentity%252Clp.is_member%252Cmode%252Cns%252Cns.lp%252Cns.sreg%252Cop_endpoint%252Cresponse_nonce%252Creturn_to%252Csigned%252Csreg.email%252Csreg.nickname%252Csreg.timezone&openid.sreg.email=scottstensland%2540gmail.com&openid.sreg.nickname=scottstensland&openid.sreg.timezone=America%252FNew_York
here are the errors on my browser ( chrome and ff both with
addons shut off)
on my kubuntu laptop -- every other page runs fine except yours
*<class 'openid.message.InvalidOpenIDNamespace'>* Python 2.7.3:
/usr/bin/python
Sun Nov 26 16:53:45 2017
A problem occurred in a Python script. Here is the sequence of function
calls leading up to the error, in the order they occurred.
/usr/lib/pymodules/python2.7/flup/server/fcgi_base.py in
*run*(self=<flup.server.fcgi_base.Request
object>)
556
"""Runs the handler, flushes the streams, and ends the request."""
557 try:
=> 558 protocolStatus, appStatus = self.server.handler(self)
559 except:
560 traceback.print_exc(file=self.stderr)
protocolStatus *undefined*, appStatus *undefined*, *self* =
<flup.server.fcgi_base.Request object>, self.*server* =
<flup.server.fcgi.WSGIServer object>, self.server.*handler* = <bound method
WSGIServer.handler of <flup.server.fcgi.WSGIServer object>>
/usr/lib/pymodules/python2.7/flup/server/fcgi_base.py in
*handler*(self=<flup.server.fcgi.WSGIServer
object>, req=<flup.server.fcgi_base.Request object>)
1116 try:
1117 try:
=> 1118 result = self.application(environ, start_response)
1119 try:
1120 for data in result:
*result* = None, *self* = <flup.server.fcgi.WSGIServer object>, self.
*application* = <function script_name_fixer>, *environ* = {'DOCUMENT_ROOT':
'/etc/apache2/htdocs', 'GATEWAY_INTERFACE': 'CGI/1.1', 'HTTP_ACCEPT':
'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'HTTP_ACCEPT_ENCODING': 'gzip, deflate, br', 'HTTP_ACCEPT_LANGUAGE':
'en-US,en;q=0.5', 'HTTP_CACHE_CONTROL': 'max-age=259200',
'HTTP_CONNECTION': 'keep-alive', 'HTTP_COOKIE':
'MOIN_SESSION_80_ROOT=d023e3c447b574e25c9365796a0...3556.1511713822;
_gid=GA1.2.1606034193.1511713822', 'HTTP_DNT': '1', 'HTTP_HOST': '
wiki.kubuntu.org', ...}, *start_response* = <function start_response>
/srv/wiki.kubuntu.org/moin.fcgi in *script_name_fixer*(env={'DOCUMENT_ROOT':
'/etc/apache2/htdocs', 'GATEWAY_INTERFACE': 'CGI/1.1', 'HTTP_ACCEPT':
'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'HTTP_ACCEPT_ENCODING': 'gzip, deflate, br', 'HTTP_ACCEPT_LANGUAGE':
'en-US,en;q=0.5', 'HTTP_CACHE_CONTROL': 'max-age=259200',
'HTTP_CONNECTION': 'keep-alive', 'HTTP_COOKIE':
'MOIN_SESSION_80_ROOT=d023e3c447b574e25c9365796a0...3556.1511713822;
_gid=GA1.2.1606034193.1511713822', 'HTTP_DNT': '1', 'HTTP_HOST': '
wiki.kubuntu.org', ...}, start=<function start_response>)
55 def script_name_fixer(env, start):
56 env['SCRIPT_NAME'] = fix_script_name
=> 57 return app(env, start)
58 application = script_name_fixer
59
*global* *app* = <MoinMoin.wsgiapp.Application object>, *env* =
{'DOCUMENT_ROOT': '/etc/apache2/htdocs', 'GATEWAY_INTERFACE': 'CGI/1.1',
'HTTP_ACCEPT':
'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'HTTP_ACCEPT_ENCODING': 'gzip, deflate, br', 'HTTP_ACCEPT_LANGUAGE':
'en-US,en;q=0.5', 'HTTP_CACHE_CONTROL': 'max-age=259200',
'HTTP_CONNECTION': 'keep-alive', 'HTTP_COOKIE':
'MOIN_SESSION_80_ROOT=d023e3c447b574e25c9365796a0...3556.1511713822;
_gid=GA1.2.1606034193.1511713822', 'HTTP_DNT': '1', 'HTTP_HOST': '
wiki.kubuntu.org', ...}, *start* = <function start_response>
/usr/lib/python2.7/dist-packages/MoinMoin/wsgiapp.py in
*__call__*(self=<MoinMoin.wsgiapp.Application
object>, environ={'DOCUMENT_ROOT': '/etc/apache2/htdocs',
'GATEWAY_INTERFACE': 'CGI/1.1', 'HTTP_ACCEPT':
'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'HTTP_ACCEPT_ENCODING': 'gzip, deflate, br', 'HTTP_ACCEPT_LANGUAGE':
'en-US,en;q=0.5', 'HTTP_CACHE_CONTROL': 'max-age=259200',
'HTTP_CONNECTION': 'keep-alive', 'HTTP_COOKIE':
'MOIN_SESSION_80_ROOT=d023e3c447b574e25c9365796a0...3556.1511713822;
_gid=GA1.2.1606034193.1511713822', 'HTTP_DNT': '1', 'HTTP_HOST': '
wiki.kubuntu.org', ...}, start_response=<function start_response>)
279 request = None
280 request = self.Request(environ)
=> 281 context = init(request)
282 response = run(context)
283 context.clock.stop('total')
context *undefined*, *global* *init* = <function init>, *request* =
<MoinMoin.wsgiapp.AppRequest object>
/usr/lib/python2.7/dist-packages/MoinMoin/wsgiapp.py in
*init*(request=<MoinMoin.wsgiapp.AppRequest
object>)
53
context.session = context.cfg.session_service.get_session(context)
54
=> 55 context.user = setup_user(context, context.session)
56
57 context.lang = setup_i18n_postauth(context)
*context* = <AllContext ['AllContext']>, context.*user* =
<MoinMoin.user.User at 0x7fd6e5e31a70 name:'' valid:0>, *global*
*setup_user* = <function setup_user>, context.*session* = <MoinSession
d023e3c447b574e25c9365796a08fb9ec69...OpenIDServiceEndpoint object at
0x7fd6e5e1f6d0>}>
/usr/lib/python2.7/dist-packages/MoinMoin/wsgiapp.py in
*setup_user*(context=<AllContext
['AllContext']>, session=<MoinSession
d023e3c447b574e25c9365796a08fb9ec69...OpenIDServiceEndpoint object at
0x7fd6e5e1f6d0>}>)
216 'stage': form.get('stage')
217 }
=> 218 userobj = auth.handle_login(context, userobj, **params)
219 elif 'logout' in form:
220 userobj = auth.handle_logout(context, userobj)
*userobj* = None, *global* *auth* = <module 'MoinMoin.auth' from
'/usr/lib/python2.7/dist-packages/MoinMoin/auth/__init__.pyc'>, auth.
*handle_login* = <function handle_login>, *context* = <AllContext
['AllContext']>, *params* = {'attended': True, 'openid_identifier': None,
'password': None, 'stage': u'openid', 'username': None}
/usr/lib/python2.7/dist-packages/MoinMoin/auth/__init__.py in
*handle_login*(request=<AllContext ['AllContext']>, userobj=None,
username=None, password=None, attended=True, openid_identifier=None,
stage=u'openid')
394 if stage and authmethod.name != stage:
395 continue
=> 396 ret = authmethod.login(request, userobj, **params)
397
398 userobj = ret.user_obj
ret *undefined*, *authmethod* = <MoinMoin.auth.openidrp.OpenIDAuth
instance>, authmethod.*login* = <bound method OpenIDAuth.login of
<MoinMoin.auth.openidrp.OpenIDAuth instance>>, *request* = <AllContext
['AllContext']>, *userobj* = None, *params* = {'attended': True,
'multistage': True, 'openid_identifier': None, 'password': None,
'username': None}
/usr/lib/python2.7/dist-packages/MoinMoin/auth/openidrp.py in
*login*(self=<MoinMoin.auth.openidrp.OpenIDAuth
instance>, request=<AllContext ['AllContext']>, user_obj=None,
**kw={'attended': True, 'multistage': True, 'openid_identifier': None,
'password': None, 'username': None})
261
262 if continuation:
=> 263 return self._handle_continuation(request)
264
265 # openid is designed to work together with other auths
*self* = <MoinMoin.auth.openidrp.OpenIDAuth instance>, self.
*_handle_continuation* = <bound method OpenIDAuth._handle_continuation of
<MoinMoin.auth.openidrp.OpenIDAuth instance>>, *request* = <AllContext
['AllContext']>
/usr/lib/python2.7/dist-packages/MoinMoin/auth/openidrp.py in
*_handle_continuation*(self=<MoinMoin.auth.openidrp.OpenIDAuth instance>,
request=<AllContext ['AllContext']>)
235 if oidstage == '1':
236 logging.debug('OpenID: handle verify continuation')
=> 237 return self._handle_verify_continuation(request)
238 elif oidstage == '2':
239 logging.debug('OpenID: handle name continuation')
*self* = <MoinMoin.auth.openidrp.OpenIDAuth instance>, self.
*_handle_verify_continuation* = <bound method
OpenIDAuth._handle_verify_continua... of <MoinMoin.auth.openidrp.OpenIDAuth
instance>>, *request* = <AllContext ['AllContext']>
/usr/lib/python2.7/dist-packages/MoinMoin/auth/openidrp.py in
*_handle_verify_continuation*(self=<MoinMoin.auth.openidrp.OpenIDAuth
instance>, request=<AllContext ['AllContext']>)
148 current_url = get_multistage_continuation_url(request,
self.name,
149
{'oidstage': '1'})
=> 150 info = oidconsumer.complete(query, current_url)
151 if info.status == consumer.FAILURE:
152 logging.debug(_("OpenID error: %s.") % info.message)
info *undefined*, *oidconsumer* = <openid.consumer.consumer.Consumer
object>, oidconsumer.*complete* = <bound method Consumer.complete of
<openid.consumer.consumer.Consumer object>>, *query* = {'action': u'login',
'janrain_nonce': u'2017-11-26T16%3A53%3A42ZX7x1M2', 'login': u'1',
'oidstage': u'1', 'openid.assoc_handle':
u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D', 'openid.claimed_id':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'openid.identity':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'openid.lp.is_member':
u'', 'openid.mode': u'id_res', 'openid.ns':
u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0',
...}, *current_url* = '
http://wiki.kubuntu.org/?action=login&login=1&oidstage=1&stage=openid'
/usr/lib/python2.7/dist-packages/openid/consumer/consumer.py in
*complete*(self=<openid.consumer.consumer.Consumer
object>, query={'action': u'login', 'janrain_nonce':
u'2017-11-26T16%3A53%3A42ZX7x1M2', 'login': u'1', 'oidstage': u'1',
'openid.assoc_handle': u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D',
'openid.claimed_id': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.identity': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.lp.is_member': u'', 'openid.mode': u'id_res', 'openid.ns':
u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0', ...}, current_url='
http://wiki.kubuntu.org/?action=login&login=1&oidstage=1&stage=openid')
411 endpoint = self.session.get(self._token_key)
412
=> 413 message = Message.fromPostArgs(query)
414
response = self.consumer.complete(message, endpoint, current_url)
415
message *undefined*, *global* *Message* = <class 'openid.message.Message'>,
Message.*fromPostArgs* = <bound method type.fromPostArgs of <class
'openid.message.Message'>>, *query* = {'action': u'login', 'janrain_nonce':
u'2017-11-26T16%3A53%3A42ZX7x1M2', 'login': u'1', 'oidstage': u'1',
'openid.assoc_handle': u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D',
'openid.claimed_id': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.identity': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.lp.is_member': u'', 'openid.mode': u'id_res', 'openid.ns':
u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0', ...}
/usr/lib/python2.7/dist-packages/openid/message.py in
*fromPostArgs*(cls=<class
'openid.message.Message'>, args={'action': u'login', 'janrain_nonce':
u'2017-11-26T16%3A53%3A42ZX7x1M2', 'login': u'1', 'oidstage': u'1',
'openid.assoc_handle': u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D',
'openid.claimed_id': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.identity': u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk',
'openid.lp.is_member': u'', 'openid.mode': u'id_res', 'openid.ns':
u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0', ...})
165 openid_args[rest] = value
166
=> 167 self._fromOpenIDArgs(openid_args)
168
169 return self
*self* = <openid.message.Message {(<Symbol Bare namespace...rain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>, self.*_fromOpenIDArgs* = <bound method
Message._fromOpenIDArgs of <openid...ain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>>, *openid_args* = {'assoc_handle':
u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D', 'claimed_id':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'identity':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'lp.is_member': u'',
'mode': u'id_res', 'ns': u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0',
'ns.lp': u'http%3A%2F%2Fns.launchpad.net%2F2007%2Fopenid-teams', 'ns.sreg':
u'http%3A%2F%2Fopenid.net%2Fextensions%2Fsreg%2F1.1', 'op_endpoint':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bopenid', 'response_nonce':
u'2017-11-26T16%3A53%3A45ZGt1PhU', ...}
/usr/lib/python2.7/dist-packages/openid/message.py in
*_fromOpenIDArgs*(self=<openid.message.Message
{(<Symbol Bare namespace...rain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>, openid_args={'assoc_handle':
u'%7BHMAC-SHA1%7D%7B5a1aeaea%7D%7Bgx2ruw%3D%3D%7D', 'claimed_id':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'identity':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bid%2FmGHCLLk', 'lp.is_member': u'',
'mode': u'id_res', 'ns': u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0',
'ns.lp': u'http%3A%2F%2Fns.launchpad.net%2F2007%2Fopenid-teams', 'ns.sreg':
u'http%3A%2F%2Fopenid.net%2Fextensions%2Fsreg%2F1.1', 'op_endpoint':
u'https%3A%2F%2Flogin.ubuntu.com%2F%2Bopenid', 'response_nonce':
u'2017-11-26T16%3A53%3A45ZGt1PhU', ...})
198 elif ns_alias == NULL_NAMESPACE and ns_key == 'ns':
199 # null namespace
=> 200 self.setOpenIDNamespace(value, False)
201 else:
202 ns_args.append((ns_alias, ns_key, value))
*self* = <openid.message.Message {(<Symbol Bare namespace...rain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>, self.*setOpenIDNamespace* = <bound
method Message.setOpenIDNamespace of <ope...ain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>>, *value* = u'http%3A%2F%
2Fspecs.openid.net%2Fauth%2F2.0', *builtin* *False* = False
/usr/lib/python2.7/dist-packages/openid/message.py in
*setOpenIDNamespace*(self=<openid.message.Message
{(<Symbol Bare namespace...rain_nonce'):
u'2017-11-26T16%3A53%3A42ZX7x1M2'}>, openid_ns_uri=u'http%3A%2F%
2Fspecs.openid.net%2Fauth%2F2.0', implicit=False)
238 """
239 if openid_ns_uri not in self.allowed_openid_namespaces:
=> 240 raise InvalidOpenIDNamespace(openid_ns_uri)
241
242
self.namespaces.addAlias(openid_ns_uri, NULL_NAMESPACE, implicit)
*global* *InvalidOpenIDNamespace* = <class
'openid.message.InvalidOpenIDNamespace'>, *openid_ns_uri* = u'http%3A%2F%
2Fspecs.openid.net%2Fauth%2F2.0'
*<class 'openid.message.InvalidOpenIDNamespace'>*: Invalid OpenID Namespace
u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0'
args = (u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0',)
message = u'http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0'
take care,
Scott
*The duty of man who investigates the writings of scientists, if learning
the truth is his goal, is to make himself an enemy of all that he reads and
… attack it from every side. He should also suspect himself as he performs
his critical examination of it, so that he may avoid falling into either
prejudice or leniency. *
– Ibn al-Haytham (965-1040 CE)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kde.org/pipermail/kde-www/attachments/20171126/fb6c0a7b/attachment-0001.html>
More information about the kde-www
mailing list