Bienvenue sur

Bienvenue sur , le site de la communauté des utilisateurs francophones de PostGIS.

PostGIS ajoute le support d'objets géographique à la base de données PostgreSQL. En effet, PostGIS "spatialise" le serverur PostgreSQL, ce qui permet de l'utiliser comme une base de données SIG.

Maintenu à jour, en fonction de nos disponibilités et des diverses sorties des outils que nous testons, nous vous proposons l'ensemble de nos travaux publiés en langue française.

Changes between Version 3 and Version 4 of TracStandalone

22/08/2013 01:03:16 (10 years ago)



  • TracStandalone

    v3 v4  
    8484Use [ WindowsServiceScript], available at [ Trac Hacks]. Installs, removes, starts, stops, etc. your Trac service. 
     86=== Option 3 === 
     88also cygwin's cygrunsrv.exe can be used: 
     90$ cygrunsrv --install tracd --path /cygdrive/c/Python27/Scripts/tracd.exe --args '--port 8000 --env-parent-dir E:\IssueTrackers\Trac\Projects' 
     91$ net start tracd 
    8694== Using Authentication == 
    127135=== Basic Authorization: Using a htpasswd password file === 
    128136This section describes how to use `tracd` with Apache .htpasswd files. 
     138  Note: It is necessary (at least with Python 2.6) to install the fcrypt package in order to 
     139  decode the htpasswd format.  Trac source code attempt an `import crypt` first, but there 
     140  is no such package for Python 2.6. 
    130142To create a .htpasswd file use Apache's `htpasswd` command (see [#GeneratingPasswordsWithoutApache below] for a method to create these files without using Apache): 
    261273See also [trac:TracOnWindowsIisAjp], [trac:TracNginxRecipe]. 
     275=== Authentication for tracd behind a proxy 
     276It is convenient to provide central external authentication to your tracd instances, instead of using {{{--basic-auth}}}. There is some discussion about this in #9206. 
     278Below is example configuration based on Apache 2.2, mod_proxy, mod_authnz_ldap. 
     280First we bring tracd into Apache's location namespace. 
     283<Location /project/proxified> 
     284        Require ldap-group cn=somegroup, ou=Groups, 
     285        Require ldap-user somespecificusertoo 
     286        ProxyPass http://localhost:8101/project/proxified/ 
     287        # Turns out we don't really need complicated RewriteRules here at all 
     288        RequestHeader set REMOTE_USER %{REMOTE_USER}s 
     292Then we need a single file plugin to recognize HTTP_REMOTE_USER header as valid authentication source. HTTP headers like '''HTTP_FOO_BAR''' will get converted to '''Foo-Bar''' during processing. Name it something like '''''' and drop it into '''proxified/plugins''' directory: 
     295from trac.core import * 
     296from trac.config import BoolOption 
     297from trac.web.api import IAuthenticator 
     299class MyRemoteUserAuthenticator(Component): 
     301    implements(IAuthenticator) 
     303    obey_remote_user_header = BoolOption('trac', 'obey_remote_user_header', 'false',  
     304               """Whether the 'Remote-User:' HTTP header is to be trusted for user logins  
     305                (''since ??.??').""")  
     307    def authenticate(self, req): 
     308        if self.obey_remote_user_header and req.get_header('Remote-User'):  
     309            return req.get_header('Remote-User')  
     310        return None 
     314Add this new parameter to your TracIni: 
     319obey_remote_user_header = true 
     323Run tracd: 
     325tracd -p 8101 -r -s proxified --base-path=/project/proxified 
    263328=== Serving a different base path than / === 
    264329Tracd supports serving projects with different base urls than /<project>. The parameter name to change this is