| 63 | {{{#!div |
| 64 | Once the service is installed, it might be simpler to run the Registry Editor rather than use the `reg add` command documented above. Navigate to:[[BR]] |
| 65 | `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tracd\Parameters` |
| 66 | |
| 67 | Three (string) parameters are provided: |
| 68 | ||!AppDirectory ||C:\Python26\ || |
| 69 | ||Application ||python.exe || |
| 70 | ||!AppParameters ||scripts\tracd-script.py -p 8080 ... || |
| 71 | |
| 72 | Note that, if the !AppDirectory is set as above, the paths of the executable ''and'' of the script name and parameter values are relative to the directory. This makes updating Python a little simpler because the change can be limited, here, to a single point. |
| 73 | (This is true for the path to the .htpasswd file, as well, despite the documentation calling out the /full/path/to/htpasswd; however, you may not wish to store that file under the Python directory.) |
| 74 | }}} |
| 75 | |
75 | | Using tracd with Apache .htpasswd files: |
76 | | |
77 | | To create a .htpasswd file using htpasswd: |
78 | | |
79 | | {{{ |
80 | | $ sudo htpasswd -c /path/to/env/.htpasswd username |
81 | | }}} |
82 | | then for additional users: |
83 | | {{{ |
84 | | $ sudo htpasswd /path/to/env/.htpasswd username2 |
85 | | }}} |
86 | | then for starting the tracd (on windows skip the "=" after --basic-auth): |
87 | | {{{ |
88 | | tracd -p 8080 --basic-auth=environmentname,/fullpath/environmentname/.htpasswd,/fullpath/environmentname /fullpath/environmentname |
89 | | }}} |
90 | | |
91 | | `environmentname` is the directory name of the Trac project folder, as opposed to `/fullpath/environmentname` which is the full path to the Trac project folder. See below for another example. |
92 | | |
93 | | Tracd provides support for both Basic and Digest authentication. The default is to use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the examples below. (You must still specify a dialogic "realm", which can be an empty string by trailing the BASICAUTH with a comma.) |
94 | | |
95 | | ''Support for Basic authentication was added in version 0.9.'' |
96 | | |
97 | | The general format for using authentication is (replace `--auth` with `--basic-auth` if you want to use Basic auth): |
98 | | |
| 97 | Tracd provides support for both Basic and Digest authentication. Digest is considered more secure. The examples below use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the command line. |
| 98 | |
| 99 | The general format for using authentication is: |
211 | | |
212 | | Note: If you would like to use --basic-auth you need to use htpasswd tool from apache server to generate .htpasswd file. The remaining part is similar but make sure to use empty realm (i.e. coma after path). Make sure to use -m option for it. If you do not have Apache, [trac:source:/tags/trac-0.11/contrib/htpasswd.py htpasswd.py] may help. (Note that it requires a `crypt` or `fcrypt` module; see the source comments for details.) |
213 | | |
214 | | It is possible to use md5sum utility to generate digest-password file using such method: |
215 | | {{{ |
216 | | $ printf "${user}:trac:${password}" | md5sum - >>user.htdigest |
217 | | }}} |
218 | | and manually delete " -" from the end and add "${user}:trac:" to the start of line from 'to-file'. |
| 214 | ==== Using `md5sum` |
| 215 | It is possible to use `md5sum` utility to generate digest-password file: |
| 216 | {{{ |
| 217 | user= |
| 218 | realm= |
| 219 | password= |
| 220 | path_to_file= |
| 221 | echo ${user}:${realm}:$(printf "${user}:${realm}:${password}" | md5sum - | sed -e 's/\s\+-//') > ${path_to_file} |
| 222 | }}} |
| 223 | |
| 224 | == Reference == |
| 225 | |
| 226 | Here's the online help, as a reminder (`tracd --help`): |
| 227 | {{{ |
| 228 | Usage: tracd [options] [projenv] ... |
| 229 | |
| 230 | Options: |
| 231 | --version show program's version number and exit |
| 232 | -h, --help show this help message and exit |
| 233 | -a DIGESTAUTH, --auth=DIGESTAUTH |
| 234 | [projectdir],[htdigest_file],[realm] |
| 235 | --basic-auth=BASICAUTH |
| 236 | [projectdir],[htpasswd_file],[realm] |
| 237 | -p PORT, --port=PORT the port number to bind to |
| 238 | -b HOSTNAME, --hostname=HOSTNAME |
| 239 | the host name or IP address to bind to |
| 240 | --protocol=PROTOCOL http|scgi|ajp|fcgi |
| 241 | -q, --unquote unquote PATH_INFO (may be needed when using ajp) |
| 242 | --http10 use HTTP/1.0 protocol version instead of HTTP/1.1 |
| 243 | --http11 use HTTP/1.1 protocol version (default) |
| 244 | -e PARENTDIR, --env-parent-dir=PARENTDIR |
| 245 | parent directory of the project environments |
| 246 | --base-path=BASE_PATH |
| 247 | the initial portion of the request URL's "path" |
| 248 | -r, --auto-reload restart automatically when sources are modified |
| 249 | -s, --single-env only serve a single project without the project list |
| 250 | -d, --daemonize run in the background as a daemon |
| 251 | --pidfile=PIDFILE when daemonizing, file to which to write pid |
| 252 | --umask=MASK when daemonizing, file mode creation mask to use, in |
| 253 | octal notation (default 022) |
| 254 | --group=GROUP the group to run as |
| 255 | --user=USER the user to run as |
| 256 | }}} |
| 257 | |
| 258 | Use the -d option so that tracd doesn't hang if you close the terminal window where tracd was started. |
237 | | === Using apache rewrite rules === |
238 | | In some situations when you choose to use tracd behind apache, you might experience issues with redirects, like being redirected to URLs with the wrong host or protocol. In this case (and only in this case), setting the `[trac] use_base_url_for_redirect` to `true` can help, as this will force Trac to use the value of `[trac] base_url` for doing the redirects. |
| 277 | === Using tracd behind a proxy |
| 278 | |
| 279 | In some situations when you choose to use tracd behind Apache or another web server. |
| 280 | |
| 281 | In this situation, you might experience issues with redirects, like being redirected to URLs with the wrong host or protocol. In this case (and only in this case), setting the `[trac] use_base_url_for_redirect` to `true` can help, as this will force Trac to use the value of `[trac] base_url` for doing the redirects. |
| 282 | |
| 283 | If you're using the AJP protocol to connect with `tracd` (which is possible if you have flup installed), then you might experience problems with double quoting. Consider adding the `--unquote` parameter. |
| 284 | |
| 285 | See also [trac:TracOnWindowsIisAjp], [trac:TracNginxRecipe]. |
| 286 | |
| 287 | === Authentication for tracd behind a proxy |
| 288 | It is convenient to provide central external authentication to your tracd instances, instead of using {{{--basic-auth}}}. There is some discussion about this in #9206. |
| 289 | |
| 290 | Below is example configuration based on Apache 2.2, mod_proxy, mod_authnz_ldap. |
| 291 | |
| 292 | First we bring tracd into Apache's location namespace. |
| 293 | |
| 294 | {{{ |
| 295 | <Location /project/proxified> |
| 296 | Require ldap-group cn=somegroup, ou=Groups,dc=domain.com |
| 297 | Require ldap-user somespecificusertoo |
| 298 | ProxyPass http://localhost:8101/project/proxified/ |
| 299 | # Turns out we don't really need complicated RewriteRules here at all |
| 300 | RequestHeader set REMOTE_USER %{REMOTE_USER}s |
| 301 | </Location> |
| 302 | }}} |
| 303 | |
| 304 | Then we need a single file plugin to recognize HTTP_REMOTE_USER header as valid authentication source. HTTP headers like '''HTTP_FOO_BAR''' will get converted to '''Foo-Bar''' during processing. Name it something like '''remote-user-auth.py''' and drop it into '''proxified/plugins''' directory: |
| 305 | {{{ |
| 306 | #!python |
| 307 | from trac.core import * |
| 308 | from trac.config import BoolOption |
| 309 | from trac.web.api import IAuthenticator |
| 310 | |
| 311 | class MyRemoteUserAuthenticator(Component): |
| 312 | |
| 313 | implements(IAuthenticator) |
| 314 | |
| 315 | obey_remote_user_header = BoolOption('trac', 'obey_remote_user_header', 'false', |
| 316 | """Whether the 'Remote-User:' HTTP header is to be trusted for user logins |
| 317 | (''since ??.??').""") |
| 318 | |
| 319 | def authenticate(self, req): |
| 320 | if self.obey_remote_user_header and req.get_header('Remote-User'): |
| 321 | return req.get_header('Remote-User') |
| 322 | return None |
| 323 | |
| 324 | }}} |
| 325 | |
| 326 | Add this new parameter to your TracIni: |
| 327 | {{{ |
| 328 | ... |
| 329 | [trac] |
| 330 | ... |
| 331 | obey_remote_user_header = true |
| 332 | ... |
| 333 | }}} |
| 334 | |
| 335 | Run tracd: |
| 336 | {{{ |
| 337 | tracd -p 8101 -r -s proxified --base-path=/project/proxified |
| 338 | }}} |
| 339 | |
| 340 | Note that if you want to install this plugin for all projects, you have to put it in your [TracPlugins#Plugindiscovery global plugins_dir] and enable it in your global trac.ini. |
| 341 | |
| 342 | Global config (e.g. `/srv/trac/conf/trac.ini`): |
| 343 | {{{ |
| 344 | [components] |
| 345 | remote-user-auth.* = enabled |
| 346 | [inherit] |
| 347 | plugins_dir = /srv/trac/plugins |
| 348 | [trac] |
| 349 | obey_remote_user_header = true |
| 350 | }}} |
| 351 | |
| 352 | Environment config (e.g. `/srv/trac/envs/myenv`): |
| 353 | {{{ |
| 354 | [inherit] |
| 355 | file = /srv/trac/conf/trac.ini |
| 356 | }}} |