This queue is for tickets about the Net-OpenID-Consumer CPAN distribution.

Report information
The Basics
Id:
48728
Status:
resolved
Priority:
Low/Low

People
Owner:
crew [...] cs.stanford.edu
Requestors:
joey [...] kitenet.net
Cc:
AdminCc:

BugTracker
Severity:
(no value)
Broken in:
(no value)
Fixed in:
  • 1.030099_006
  • 1.11



Subject: fails to find identity server for google openid
The following semi(?) official google openid thing doesn't work with this module: http://openid-provider.appspot.com/larrylud I log in with an openid like http://openid-provider.appspot.com/joey@kitenet.net , and get back: "Error: OpenID failure: no_identity_server: The provided URL doesn't declare its OpenID identity server." Did some investigation. verified_identity seems to think this is using Openid V1, so _discover_aendpointscceptable_ gets called with force_version => 1 However, the page header looks like this, apparently trying to support openid 1 and 2, with 2 the first one in the rel link: <head> <meta http-equiv="content-type" content="text/html; charset=utf-8"/> <title> OpenID for Google Accounts </title> <link rel="openid2.provider openid.server" href="http://openid-provider.appspot.com/joey%40kitenet.net" /> <link href="/static/base.css" rel="stylesheet" type="text/css"/> So, _find_semantic_info parses that to: semantic info (http://openid-provider.appspot.com/joey@kitenet.net) = openid.delegate => , openid.server => , foaf => , openid2.provider => http://openid-provider.appspot.com/joey%40kitenet.net, atom => , foaf.maker => , rss => Since version 1 was forced, _discover_acceptable_endpoints ignores the openid2.provider and returns no endpoints. The right place to fix this seems to be in the _find_semantic_info parser. It should probably fill in both openid2.provider and openid.server in this case. (BTW, the link rel parser also seems to fail in the case where the href comes before the rel attribute. Isn't that a valid order that it should support?)
From: crew@cs.stanford.edu
Show quoted text
> The right place to fix this seems to be in the _find_semantic_info > parser. It should probably fill in both openid2.provider and > openid.server in this case.
I believe the revised patch that I just uploaded for #54343 (see patch2.txt there) addresses this
I believe this is fixed in Net-OpenID-Consumer-1.11 If you want to try it out, please make sure you've also installed the latest Net-OpenID-Common. Feel free to re-open (or start a new ticket) if I'm mistaken about this. Thanks for the report and sorry this took so long to get to... - Roger Crew (new co-maintainer as of a few weeks ago)


This service runs on Request Tracker, is sponsored by The Perl Foundation, and maintained by Best Practical Solutions.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.