| 63 | {{{#!div |
| 64 | Once the service is installed, it might be simpler to run the Registry Editor rather than use the `reg add` command documented above. Navigate to:[[BR]] |
| 65 | `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tracd\Parameters` |
| 66 | |
| 67 | Three (string) parameters are provided: |
| 68 | ||!AppDirectory ||C:\Python26\ || |
| 69 | ||Application ||python.exe || |
| 70 | ||!AppParameters ||scripts\tracd-script.py -p 8080 ... || |
| 71 | |
| 72 | Note that, if the !AppDirectory is set as above, the paths of the executable ''and'' of the script name and parameter values are relative to the directory. This makes updating Python a little simpler because the change can be limited, here, to a single point. |
| 73 | (This is true for the path to the .htpasswd file, as well, despite the documentation calling out the /full/path/to/htpasswd; however, you may not wish to store that file under the Python directory.) |
| 74 | }}} |
| 75 | |
| 76 | For Windows 7 User, srvany.exe may not be an option, so you can use [http://www.google.com/search?q=winserv.exe WINSERV] utility and run: |
| 77 | {{{ |
| 78 | "C:\path\to\winserv.exe" install tracd -displayname "tracd" -start auto "C:\path\to\python.exe" c:\path\to\python\scripts\tracd-script.py <your tracd parameters>" |
| 79 | |
| 80 | net start tracd |
| 81 | }}} |
| 82 | |
| 83 | === Option 2 === |
| 84 | |
| 85 | Use [http://trac-hacks.org/wiki/WindowsServiceScript WindowsServiceScript], available at [http://trac-hacks.org/ Trac Hacks]. Installs, removes, starts, stops, etc. your Trac service. |
| 86 | |
| 87 | === Option 3 === |
| 88 | |
| 89 | also cygwin's cygrunsrv.exe can be used: |
| 90 | {{{ |
| 91 | $ cygrunsrv --install tracd --path /cygdrive/c/Python27/Scripts/tracd.exe --args '--port 8000 --env-parent-dir E:\IssueTrackers\Trac\Projects' |
| 92 | $ net start tracd |
| 93 | }}} |
| 94 | |
63 | | Using tracd with Apache .htpasswd files: |
64 | | |
65 | | To create a .htpasswd file using htpasswd: |
66 | | |
| 97 | Tracd provides support for both Basic and Digest authentication. Digest is considered more secure. The examples below use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the command line. |
| 98 | |
| 99 | The general format for using authentication is: |
| 100 | {{{ |
| 101 | $ tracd -p port --auth="base_project_dir,password_file_path,realm" project_path |
| 102 | }}} |
| 103 | where: |
| 104 | * '''base_project_dir''': the base directory of the project specified as follows: |
| 105 | * when serving multiple projects: ''relative'' to the `project_path` |
| 106 | * when serving only a single project (`-s`): the name of the project directory |
| 107 | Don't use an absolute path here as this won't work. ''Note:'' This parameter is case-sensitive even for environments on Windows. |
| 108 | * '''password_file_path''': path to the password file |
| 109 | * '''realm''': the realm name (can be anything) |
| 110 | * '''project_path''': path of the project |
| 111 | |
| 112 | * **`--auth`** in the above means use Digest authentication, replace `--auth` with `--basic-auth` if you want to use Basic auth. Although Basic authentication does not require a "realm", the command parser does, so the second comma is required, followed directly by the closing quote for an empty realm name. |
| 113 | |
| 114 | Examples: |
| 115 | |
| 116 | {{{ |
| 117 | $ tracd -p 8080 \ |
| 118 | --auth="project1,/path/to/passwordfile,mycompany.com" /path/to/project1 |
| 119 | }}} |
| 120 | |
| 121 | Of course, the password file can be be shared so that it is used for more than one project: |
| 122 | {{{ |
| 123 | $ tracd -p 8080 \ |
| 124 | --auth="project1,/path/to/passwordfile,mycompany.com" \ |
| 125 | --auth="project2,/path/to/passwordfile,mycompany.com" \ |
| 126 | /path/to/project1 /path/to/project2 |
| 127 | }}} |
| 128 | |
| 129 | Another way to share the password file is to specify "*" for the project name: |
| 130 | {{{ |
| 131 | $ tracd -p 8080 \ |
| 132 | --auth="*,/path/to/users.htdigest,mycompany.com" \ |
| 133 | /path/to/project1 /path/to/project2 |
| 134 | }}} |
| 135 | |
| 136 | === Basic Authorization: Using a htpasswd password file === |
| 137 | This section describes how to use `tracd` with Apache .htpasswd files. |
| 138 | |
| 139 | Note: It is necessary (at least with Python 2.6) to install the fcrypt package in order to |
| 140 | decode some htpasswd formats. Trac source code attempt an `import crypt` first, but there |
| 141 | is no such package for Python 2.6. Only `SHA-1` passwords (since Trac 1.0) work without this module. |
| 142 | |
| 143 | To create a .htpasswd file use Apache's `htpasswd` command (see [#GeneratingPasswordsWithoutApache below] for a method to create these files without using Apache): |
74 | | then for starting the tracd (on windows skip the "=" after --basic-auth): |
75 | | {{{ |
76 | | $ tracd -p 8080 --basic-auth=environmentname,/fullpath/environmentname/.htpasswd,/fullpath/environmentname /fullpath/environmentname |
77 | | }}} |
78 | | |
79 | | Tracd provides support for both Basic and Digest authentication. The default is to use Digest; to use Basic authentication, replace `--auth` with `--basic-auth` in the examples below. (You must still specify a dialogic "realm", which can be an empty string by trailing the BASICAUTH with a comma.) |
80 | | |
81 | | ''Support for Basic authentication was added in version 0.9.'' |
82 | | |
83 | | The general format for using authentication is (on windows skip the "=" after --auth): |
84 | | |
85 | | {{{ |
86 | | $ tracd -p port --auth=base_project_dir,password_file_path,realm project_path |
87 | | }}} |
88 | | |
89 | | where: |
90 | | |
91 | | * '''base_project_dir''' is the base directory of the project; note: this doesn't refer to the project name, and it is case-sensitive even for windows environments |
92 | | * '''password_file_path''' path of the password file |
93 | | * '''realm''' realm |
94 | | * '''project_path''' path of the project |
95 | | |
96 | | Example (on windows skip the "=" after --auth): |
97 | | |
98 | | {{{ |
99 | | $ tracd -p 8080 \ |
100 | | --auth=project1,/path/to/users.htdigest,mycompany.com /path/to/project1 |
101 | | }}} |
102 | | Of course, the digest file can be be shared so that it is used for more than one project: |
103 | | {{{ |
104 | | $ tracd -p 8080 \ |
105 | | --auth=project1,/path/to/users.htdigest,mycompany.com \ |
106 | | --auth=project2,/path/to/users.htdigest,mycompany.com \ |
107 | | /path/to/project1 /path/to/project2 |
108 | | }}} |
109 | | |
110 | | Another way to share the digest file is to specify "*" |
111 | | for the project name: |
112 | | {{{ |
113 | | $ tracd -p 8080 \ |
114 | | --auth="*",/path/to/users.htdigest,mycompany.com \ |
115 | | /path/to/project1 /path/to/project2 |
116 | | }}} |
117 | | If using the `-s` parameter for serving a Trac environment from the root of a domain, one must use `*` for the project name |
118 | | |
119 | | == How to set up an htdigest password file == |
| 151 | |
| 152 | Then to start `tracd` run something like this: |
| 153 | {{{ |
| 154 | $ tracd -p 8080 --basic-auth="projectdirname,/fullpath/environmentname/.htpasswd,realmname" /fullpath/environmentname |
| 155 | }}} |
| 156 | |
| 157 | For example: |
| 158 | {{{ |
| 159 | $ tracd -p 8080 --basic-auth="testenv,/srv/tracenv/testenv/.htpasswd,My Test Env" /srv/tracenv/testenv |
| 160 | }}} |
| 161 | ''Note:'' You might need to pass "-m" as a parameter to htpasswd on some platforms (OpenBSD). |
| 162 | |
| 163 | === Digest authentication: Using a htdigest password file === |
168 | | Note: If you would like to use --basic-auth you need to use htpasswd tool from apache server to generate .htpasswd file. The remaining part is similar but make sure to use empty realm (i.e. coma after path). When using on Windows make sure to use -m option for it (did not tested it on *nix, so not sure if that is the case there). If you do not have Apache, [trac:source:/tags/trac-0.11b2/contrib/htpasswd.py htpasswd.py] may help. (Note that it requires a `crypt` or `fcrypt` module; see the source comments for details.) |
169 | | |
170 | | It is possible to use md5sum utility to generate digest-password file using such method: |
171 | | {{{ |
172 | | $ printf "${user}:trac:${password}" | md5sum - >>user.htdigest |
173 | | }}} |
174 | | and manually delete " -" from the end and add "${user}:trac:" to the start of line from 'to-file'. |
| 214 | ==== Using `md5sum` |
| 215 | It is possible to use `md5sum` utility to generate digest-password file: |
| 216 | {{{ |
| 217 | user= |
| 218 | realm= |
| 219 | password= |
| 220 | path_to_file= |
| 221 | echo ${user}:${realm}:$(printf "${user}:${realm}:${password}" | md5sum - | sed -e 's/\s\+-//') > ${path_to_file} |
| 222 | }}} |
| 223 | |
| 224 | == Reference == |
| 225 | |
| 226 | Here's the online help, as a reminder (`tracd --help`): |
| 227 | {{{ |
| 228 | Usage: tracd [options] [projenv] ... |
| 229 | |
| 230 | Options: |
| 231 | --version show program's version number and exit |
| 232 | -h, --help show this help message and exit |
| 233 | -a DIGESTAUTH, --auth=DIGESTAUTH |
| 234 | [projectdir],[htdigest_file],[realm] |
| 235 | --basic-auth=BASICAUTH |
| 236 | [projectdir],[htpasswd_file],[realm] |
| 237 | -p PORT, --port=PORT the port number to bind to |
| 238 | -b HOSTNAME, --hostname=HOSTNAME |
| 239 | the host name or IP address to bind to |
| 240 | --protocol=PROTOCOL http|scgi|ajp|fcgi |
| 241 | -q, --unquote unquote PATH_INFO (may be needed when using ajp) |
| 242 | --http10 use HTTP/1.0 protocol version instead of HTTP/1.1 |
| 243 | --http11 use HTTP/1.1 protocol version (default) |
| 244 | -e PARENTDIR, --env-parent-dir=PARENTDIR |
| 245 | parent directory of the project environments |
| 246 | --base-path=BASE_PATH |
| 247 | the initial portion of the request URL's "path" |
| 248 | -r, --auto-reload restart automatically when sources are modified |
| 249 | -s, --single-env only serve a single project without the project list |
| 250 | -d, --daemonize run in the background as a daemon |
| 251 | --pidfile=PIDFILE when daemonizing, file to which to write pid |
| 252 | --umask=MASK when daemonizing, file mode creation mask to use, in |
| 253 | octal notation (default 022) |
| 254 | --group=GROUP the group to run as |
| 255 | --user=USER the user to run as |
| 256 | }}} |
| 257 | |
| 258 | Use the -d option so that tracd doesn't hang if you close the terminal window where tracd was started. |
189 | | which in turn can be written using the relative link syntax |
190 | | in the Wiki: `[/<project_name>/chrome/site/software-0.1.tar.gz]` |
191 | | |
192 | | Since 0.10, Trac supports a new `htdocs:` TracLinks |
193 | | syntax for the above. With this, the example link above can be written simply |
194 | | `htdocs:software-0.1.tar.gz`. |
195 | | |
196 | | === Using apache rewrite rules === |
197 | | In some situations when you choose to use tracd behind apache, you might experience issues with redirects, like being redirected to URLs with the wrong host or protocol. In this case (and only in this case), setting the `[trac] use_base_url_for_redirect` to `true` can help, as this will force Trac to use the value of `[trac] base_url` for doing the redirects. |
| 273 | which in turn can be written as `htdocs:software-0.1.tar.gz` (TracLinks syntax) or `[/<project_name>/chrome/site/software-0.1.tar.gz]` (relative link syntax). |
| 274 | |
| 275 | ''Support for `htdocs:` TracLinks syntax was added in version 0.10'' |
| 276 | |
| 277 | === Using tracd behind a proxy |
| 278 | |
| 279 | In some situations when you choose to use tracd behind Apache or another web server. |
| 280 | |
| 281 | In this situation, you might experience issues with redirects, like being redirected to URLs with the wrong host or protocol. In this case (and only in this case), setting the `[trac] use_base_url_for_redirect` to `true` can help, as this will force Trac to use the value of `[trac] base_url` for doing the redirects. |
| 282 | |
| 283 | If you're using the AJP protocol to connect with `tracd` (which is possible if you have flup installed), then you might experience problems with double quoting. Consider adding the `--unquote` parameter. |
| 284 | |
| 285 | See also [trac:TracOnWindowsIisAjp], [trac:TracNginxRecipe]. |
| 286 | |
| 287 | === Authentication for tracd behind a proxy |
| 288 | It is convenient to provide central external authentication to your tracd instances, instead of using {{{--basic-auth}}}. There is some discussion about this in #9206. |
| 289 | |
| 290 | Below is example configuration based on Apache 2.2, mod_proxy, mod_authnz_ldap. |
| 291 | |
| 292 | First we bring tracd into Apache's location namespace. |
| 293 | |
| 294 | {{{ |
| 295 | <Location /project/proxified> |
| 296 | Require ldap-group cn=somegroup, ou=Groups,dc=domain.com |
| 297 | Require ldap-user somespecificusertoo |
| 298 | ProxyPass http://localhost:8101/project/proxified/ |
| 299 | # Turns out we don't really need complicated RewriteRules here at all |
| 300 | RequestHeader set REMOTE_USER %{REMOTE_USER}s |
| 301 | </Location> |
| 302 | }}} |
| 303 | |
| 304 | Then we need a single file plugin to recognize HTTP_REMOTE_USER header as valid authentication source. HTTP headers like '''HTTP_FOO_BAR''' will get converted to '''Foo-Bar''' during processing. Name it something like '''remote-user-auth.py''' and drop it into '''proxified/plugins''' directory: |
| 305 | {{{ |
| 306 | #!python |
| 307 | from trac.core import * |
| 308 | from trac.config import BoolOption |
| 309 | from trac.web.api import IAuthenticator |
| 310 | |
| 311 | class MyRemoteUserAuthenticator(Component): |
| 312 | |
| 313 | implements(IAuthenticator) |
| 314 | |
| 315 | obey_remote_user_header = BoolOption('trac', 'obey_remote_user_header', 'false', |
| 316 | """Whether the 'Remote-User:' HTTP header is to be trusted for user logins |
| 317 | (''since ??.??').""") |
| 318 | |
| 319 | def authenticate(self, req): |
| 320 | if self.obey_remote_user_header and req.get_header('Remote-User'): |
| 321 | return req.get_header('Remote-User') |
| 322 | return None |
| 323 | |
| 324 | }}} |
| 325 | |
| 326 | Add this new parameter to your TracIni: |
| 327 | {{{ |
| 328 | ... |
| 329 | [trac] |
| 330 | ... |
| 331 | obey_remote_user_header = true |
| 332 | ... |
| 333 | }}} |
| 334 | |
| 335 | Run tracd: |
| 336 | {{{ |
| 337 | tracd -p 8101 -r -s proxified --base-path=/project/proxified |
| 338 | }}} |
| 339 | |
| 340 | Note that if you want to install this plugin for all projects, you have to put it in your [TracPlugins#Plugindiscovery global plugins_dir] and enable it in your global trac.ini. |
| 341 | |
| 342 | Global config (e.g. `/srv/trac/conf/trac.ini`): |
| 343 | {{{ |
| 344 | [components] |
| 345 | remote-user-auth.* = enabled |
| 346 | [inherit] |
| 347 | plugins_dir = /srv/trac/plugins |
| 348 | [trac] |
| 349 | obey_remote_user_header = true |
| 350 | }}} |
| 351 | |
| 352 | Environment config (e.g. `/srv/trac/envs/myenv`): |
| 353 | {{{ |
| 354 | [inherit] |
| 355 | file = /srv/trac/conf/trac.ini |
| 356 | }}} |