Changes between Version 3 and Version 4 of TracStandalone
- Timestamp:
- Jul 12, 2012, 8:06:20 PM (12 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
TracStandalone
v3 v4 84 84 Use [http://trac-hacks.org/wiki/WindowsServiceScript WindowsServiceScript], available at [http://trac-hacks.org/ Trac Hacks]. Installs, removes, starts, stops, etc. your Trac service. 85 85 86 === Option 3 === 87 88 also cygwin's cygrunsrv.exe can be used: 89 {{{ 90 $ cygrunsrv --install tracd --path /cygdrive/c/Python27/Scripts/tracd.exe --args '--port 8000 --env-parent-dir E:\IssueTrackers\Trac\Projects' 91 $ net start tracd 92 }}} 93 86 94 == Using Authentication == 87 95 88 Tracd provides support for both Basic and Digest authentication. The default is to use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the examples below. (You must still specify a dialogic "realm", which can be an empty string by trailing the BASICAUTH with a comma.) 89 96 Tracd provides support for both Basic and Digest authentication. Digest is considered more secure. The examples below use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the command line. 90 97 91 98 The general format for using authentication is: … … 93 100 $ tracd -p port --auth="base_project_dir,password_file_path,realm" project_path 94 101 }}} 95 96 102 where: 97 98 103 * '''base_project_dir''': the base directory of the project specified as follows: 99 104 * when serving multiple projects: ''relative'' to the `project_path` … … 103 108 * '''realm''': the realm name (can be anything) 104 109 * '''project_path''': path of the project 105 * **`--auth`** in the above means use Digest authentication, replace `--auth` with `--basic-auth` if you want to use Basic auth 110 111 * **`--auth`** in the above means use Digest authentication, replace `--auth` with `--basic-auth` if you want to use Basic auth. Although Basic authentication does not require a "realm", the command parser does, so the second comma is required, followed directly by the closing quote for an empty realm name. 106 112 107 113 Examples: … … 127 133 }}} 128 134 129 === Using a htpasswd password file ===135 === Basic Authorization: Using a htpasswd password file === 130 136 This section describes how to use `tracd` with Apache .htpasswd files. 131 137 138 Note: It is necessary (at least with Python 2.6) to install the fcrypt package in order to 139 decode the htpasswd format. Trac source code attempt an `import crypt` first, but there 140 is no such package for Python 2.6. 141 132 142 To create a .htpasswd file use Apache's `htpasswd` command (see [#GeneratingPasswordsWithoutApache below] for a method to create these files without using Apache): 133 134 143 {{{ 135 144 $ sudo htpasswd -c /path/to/env/.htpasswd username … … 141 150 142 151 Then to start `tracd` run something like this: 143 144 152 {{{ 145 153 $ tracd -p 8080 --basic-auth="projectdirname,/fullpath/environmentname/.htpasswd,realmname" /fullpath/environmentname … … 147 155 148 156 For example: 149 150 157 {{{ 151 158 $ tracd -p 8080 --basic-auth="testenv,/srv/tracenv/testenv/.htpasswd,My Test Env" /srv/tracenv/testenv 152 159 }}} 153 154 160 ''Note:'' You might need to pass "-m" as a parameter to htpasswd on some platforms (OpenBSD). 155 161 156 === Using a htdigest password file ===162 === Digest authentication: Using a htdigest password file === 157 163 158 164 If you have Apache available, you can use the htdigest command to generate the password file. Type 'htdigest' to get some usage instructions, or read [http://httpd.apache.org/docs/2.0/programs/htdigest.html this page] from the Apache manual to get precise instructions. You'll be prompted for a password to enter for each user that you create. For the name of the password file, you can use whatever you like, but if you use something like `users.htdigest` it will remind you what the file contains. As a suggestion, put it in your <projectname>/conf folder along with the [TracIni trac.ini] file. … … 162 168 === Generating Passwords Without Apache === 163 169 164 If you don't have Apache available, you can use this simple Python script to generate your passwords: 170 Basic Authorization can be accomplished via this [http://www.4webhelp.net/us/password.php online HTTP Password generator]. Copy the generated password-hash line to the .htpasswd file on your system. 171 172 You can use this simple Python script to generate a '''digest''' password file: 165 173 166 174 {{{ … … 196 204 }}} 197 205 198 Note: If you use the above script you must use the --auth option to tracd, not --basic-auth, and you must set the realm in the --auth value to 'trac' (without the quotes). Example usage (assuming you saved the script as trac-digest.py):206 Note: If you use the above script you must set the realm in the `--auth` argument to '''`trac`'''. Example usage (assuming you saved the script as trac-digest.py): 199 207 200 208 {{{ … … 203 211 }}} 204 212 205 206 Note: If you would like to use --basic-auth you need to use htpasswd tool from apache server to generate .htpasswd file. The remaining part is similar but make sure to use empty realm (i.e. coma after path). Make sure to use -m option for it. If you do not have Apache, [trac:source:/tags/trac-0.11/contrib/htpasswd.py htpasswd.py] may help. (Note that it requires a `crypt` or `fcrypt` module; see the source comments for details.) 207 208 It is possible to use md5sum utility to generate digest-password file using such method: 213 ==== Using `md5sum` 214 It is possible to use `md5sum` utility to generate digest-password file: 209 215 {{{ 210 216 $ printf "${user}:trac:${password}" | md5sum - >>user.htdigest … … 267 273 See also [trac:TracOnWindowsIisAjp], [trac:TracNginxRecipe]. 268 274 275 === Authentication for tracd behind a proxy 276 It is convenient to provide central external authentication to your tracd instances, instead of using {{{--basic-auth}}}. There is some discussion about this in #9206. 277 278 Below is example configuration based on Apache 2.2, mod_proxy, mod_authnz_ldap. 279 280 First we bring tracd into Apache's location namespace. 281 282 {{{ 283 <Location /project/proxified> 284 Require ldap-group cn=somegroup, ou=Groups,dc=domain.com 285 Require ldap-user somespecificusertoo 286 ProxyPass http://localhost:8101/project/proxified/ 287 # Turns out we don't really need complicated RewriteRules here at all 288 RequestHeader set REMOTE_USER %{REMOTE_USER}s 289 </Location> 290 }}} 291 292 Then we need a single file plugin to recognize HTTP_REMOTE_USER header as valid authentication source. HTTP headers like '''HTTP_FOO_BAR''' will get converted to '''Foo-Bar''' during processing. Name it something like '''remote-user-auth.py''' and drop it into '''proxified/plugins''' directory: 293 {{{ 294 #!python 295 from trac.core import * 296 from trac.config import BoolOption 297 from trac.web.api import IAuthenticator 298 299 class MyRemoteUserAuthenticator(Component): 300 301 implements(IAuthenticator) 302 303 obey_remote_user_header = BoolOption('trac', 'obey_remote_user_header', 'false', 304 """Whether the 'Remote-User:' HTTP header is to be trusted for user logins 305 (''since ??.??').""") 306 307 def authenticate(self, req): 308 if self.obey_remote_user_header and req.get_header('Remote-User'): 309 return req.get_header('Remote-User') 310 return None 311 312 }}} 313 314 Add this new parameter to your TracIni: 315 {{{ 316 ... 317 [trac] 318 ... 319 obey_remote_user_header = true 320 ... 321 }}} 322 323 Run tracd: 324 {{{ 325 tracd -p 8101 -r -s proxified --base-path=/project/proxified 326 }}} 327 269 328 === Serving a different base path than / === 270 329 Tracd supports serving projects with different base urls than /<project>. The parameter name to change this is