54 | | See also the mod_wsgi [http://code.google.com/p/modwsgi/wiki/IntegrationWithTrac installation instructions] for Trac. |
55 | | |
56 | | For troubleshooting tips, see the [TracModPython#Troubleshooting mod_python troubleshooting] section, as most Apache-related issues are quite similar, plus discussion of potential [http://code.google.com/p/modwsgi/wiki/ApplicationIssues application issues] when using mod_wsgi. |
57 | | |
58 | | == Trac with PostgreSQL == |
59 | | |
60 | | When using the mod_wsgi adapter with multiple Trac instances and PostgreSQL (or MySQL?) as a database back-end the server can get a lot of open database connections. (and thus PostgreSQL processes) |
61 | | |
62 | | A workable solution is to disabled connection pooling in Trac. This is done by setting poolable = False in trac.db.postgres_backend on the PostgreSQLConnection class. |
63 | | |
64 | | But it's not necessary to edit the source of trac, the following lines in trac.wsgi will also work: |
65 | | |
66 | | {{{ |
| 126 | For more information about using the mod_wsgi specific directives, see the [https://code.google.com/archive/p/modwsgi/wikis mod_wsgi's wiki] and more specifically the [https://code.google.com/archive/p/modwsgi/wikis/IntegrationWithTrac.wiki IntegrationWithTrac] page. |
| 127 | |
| 128 | == Configuring Authentication |
| 129 | |
| 130 | The following sections describe different methods for setting up authentication. See also [http://httpd.apache.org/docs/2.4/howto/auth.html Authentication, Authorization and Access Control] in the Apache guide. |
| 131 | |
| 132 | === Using Basic Authentication |
| 133 | |
| 134 | The simplest way to enable authentication with Apache is to create a password file. Use the `htpasswd` program as follows: |
| 135 | {{{#!sh |
| 136 | $ htpasswd -c /somewhere/trac.htpasswd admin |
| 137 | New password: <type password> |
| 138 | Re-type new password: <type password again> |
| 139 | Adding password for user admin |
| 140 | }}} |
| 141 | |
| 142 | After the first user, you don't need the "-c" option anymore: |
| 143 | {{{#!sh |
| 144 | $ htpasswd /somewhere/trac.htpasswd john |
| 145 | New password: <type password> |
| 146 | Re-type new password: <type password again> |
| 147 | Adding password for user john |
| 148 | }}} |
| 149 | |
| 150 | See the man page for `htpasswd` for full documentation. |
| 151 | |
| 152 | After you've created the users, you can set their permissions using TracPermissions. |
| 153 | |
| 154 | Now, you need to enable authentication against the password file in the Apache configuration: |
| 155 | {{{#!apache |
| 156 | <Location "/trac/login"> |
| 157 | AuthType Basic |
| 158 | AuthName "Trac" |
| 159 | AuthUserFile /somewhere/trac.htpasswd |
| 160 | Require valid-user |
| 161 | </Location> |
| 162 | }}} |
| 163 | |
| 164 | If you are hosting multiple projects, you can use the same password file for all of them: |
| 165 | {{{#!apache |
| 166 | <LocationMatch "/trac/[^/]+/login"> |
| 167 | AuthType Basic |
| 168 | AuthName "Trac" |
| 169 | AuthUserFile /somewhere/trac.htpasswd |
| 170 | Require valid-user |
| 171 | </LocationMatch> |
| 172 | }}} |
| 173 | |
| 174 | Note that neither a file nor a directory named 'login' needs to exist. See also the [https://httpd.apache.org/docs/2.4/mod/mod_auth_basic.html mod_auth_basic] documentation. |
| 175 | |
| 176 | === Using Digest Authentication |
| 177 | |
| 178 | For better security, it is recommended that you either enable SSL or at least use the "digest" authentication scheme instead of "Basic". |
| 179 | |
| 180 | You have to create your `.htpasswd` file with the `htdigest` command instead of `htpasswd`, as follows: |
| 181 | {{{#!sh |
| 182 | $ htdigest -c /somewhere/trac.htpasswd trac admin |
| 183 | }}} |
| 184 | |
| 185 | The "trac" parameter above is the "realm", and will have to be reused in the Apache configuration in the !AuthName directive: |
| 186 | |
| 187 | {{{#!apache |
| 188 | <Location "/trac/login"> |
| 189 | AuthType Digest |
| 190 | AuthName "trac" |
| 191 | AuthDigestDomain /trac |
| 192 | AuthUserFile /somewhere/trac.htpasswd |
| 193 | Require valid-user |
| 194 | </Location> |
| 195 | }}} |
| 196 | |
| 197 | For multiple environments, you can use the same `LocationMatch` as described with the previous method. |
| 198 | |
| 199 | '''Note''': `Location` cannot be used inside .htaccess files, but must instead live within the main httpd.conf file. If you are on a shared server, you therefore will not be able to provide this level of granularity. |
| 200 | |
| 201 | Don't forget to activate the mod_auth_digest. For example, on a Debian 4.0r1 (etch) system: |
| 202 | {{{#!apache |
| 203 | LoadModule auth_digest_module /usr/lib/apache2/modules/mod_auth_digest.so |
| 204 | }}} |
| 205 | |
| 206 | See also the [https://httpd.apache.org/docs/2.4/mod/mod_auth_basic.html mod_auth_digest] documentation. |
| 207 | |
| 208 | === Using LDAP Authentication |
| 209 | |
| 210 | Configuration for [https://httpd.apache.org/docs/2.4/mod/mod_ldap.html mod_ldap] authentication in Apache is more involved (httpd 2.2+ and OpenLDAP: slapd 2.3.19). |
| 211 | |
| 212 | 1. You need to load the following modules in Apache httpd.conf: |
| 213 | {{{#!apache |
| 214 | LoadModule ldap_module modules/mod_ldap.so |
| 215 | LoadModule authnz_ldap_module modules/mod_authnz_ldap.so |
| 216 | }}} |
| 217 | 1. Your httpd.conf also needs to look something like: |
| 218 | {{{#!apache |
| 219 | <Location /trac/> |
| 220 | # (if you're using it, mod_python specific settings go here) |
| 221 | Order deny,allow |
| 222 | Deny from all |
| 223 | Allow from 192.168.11.0/24 |
| 224 | AuthType Basic |
| 225 | AuthName "Trac" |
| 226 | AuthBasicProvider "ldap" |
| 227 | AuthLDAPURL "ldap://127.0.0.1/dc=example,dc=co,dc=ke?uid?sub?(objectClass=inetOrgPerson)" |
| 228 | authzldapauthoritative Off |
| 229 | Require valid-user |
| 230 | </Location> |
| 231 | }}} |
| 232 | 1. You can use the LDAP interface as a way to authenticate to a Microsoft Active Directory. Use the following as your LDAP URL: |
| 233 | {{{#!apache |
| 234 | AuthLDAPURL "ldap://directory.example.com:3268/DC=example,DC=com?sAMAccountName?sub?(objectClass=user)" |
| 235 | }}} |
| 236 | You will also need to provide an account for Apache to use when checking credentials. As this password will be listed in plain text in the configuration, you need to use an account specifically for this task: |
| 237 | {{{#!apache |
| 238 | AuthLDAPBindDN ldap-auth-user@example.com |
| 239 | AuthLDAPBindPassword "password" |
| 240 | }}} |
| 241 | The whole section looks like: |
| 242 | {{{#!apache |
| 243 | <Location /trac/> |
| 244 | # (if you're using it, mod_python specific settings go here) |
| 245 | Order deny,allow |
| 246 | Deny from all |
| 247 | Allow from 192.168.11.0/24 |
| 248 | AuthType Basic |
| 249 | AuthName "Trac" |
| 250 | AuthBasicProvider "ldap" |
| 251 | AuthLDAPURL "ldap://adserver.company.com:3268/DC=company,DC=com?sAMAccountName?sub?(objectClass=user)" |
| 252 | AuthLDAPBindDN ldap-auth-user@company.com |
| 253 | AuthLDAPBindPassword "the_password" |
| 254 | authzldapauthoritative Off |
| 255 | # require valid-user |
| 256 | Require ldap-group CN=Trac Users,CN=Users,DC=company,DC=com |
| 257 | </Location> |
| 258 | }}} |
| 259 | |
| 260 | Note 1: This is the case where the LDAP search will get around the multiple OUs, conecting to the Global Catalog Server portion of AD. Note the port is 3268, not the normal LDAP 389. The GCS is basically a "flattened" tree which allows searching for a user without knowing to which OU they belong. |
| 261 | |
| 262 | Note 2: You can also require the user be a member of a certain LDAP group, instead of just having a valid login: |
| 263 | {{{#!apache |
| 264 | Require ldap-group CN=Trac Users,CN=Users,DC=example,DC=com |
| 265 | }}} |
| 266 | |
| 267 | See also: |
| 268 | - [https://httpd.apache.org/docs/2.4/mod/mod_authnz_ldap.html mod_authnz_ldap], documentation for mod_authnz_ldap. |
| 269 | - [https://httpd.apache.org/docs/2.4/mod/mod_ldap.html mod_ldap], documentation for mod_ldap, which provides connection pooling and a shared cache. |
| 270 | - [https://trac-hacks.org/wiki/LdapPlugin TracHacks:LdapPlugin] for storing TracPermissions in LDAP. |
| 271 | |
| 272 | === Using SSPI Authentication |
| 273 | |
| 274 | If you are using Apache on Windows, you can use mod_auth_sspi to provide single-sign-on. Download the module from the !SourceForge [http://sourceforge.net/projects/mod-auth-sspi/ mod-auth-sspi project] and then add the following to your !VirtualHost: |
| 275 | {{{#!apache |
| 276 | <Location /trac/login> |
| 277 | AuthType SSPI |
| 278 | AuthName "Trac Login" |
| 279 | SSPIAuth On |
| 280 | SSPIAuthoritative On |
| 281 | SSPIDomain MyLocalDomain |
| 282 | SSPIOfferBasic On |
| 283 | SSPIOmitDomain Off |
| 284 | SSPIBasicPreferred On |
| 285 | Require valid-user |
| 286 | </Location> |
| 287 | }}} |
| 288 | |
| 289 | Using the above, usernames in Trac will be of the form `DOMAIN\username`, so you may have to re-add permissions and such. If you do not want the domain to be part of the username, set `SSPIOmitDomain On` instead. |
| 290 | |
| 291 | Some common problems with SSPI authentication: [trac:#1055], [trac:#1168] and [trac:#3338]. |
| 292 | |
| 293 | See also [trac:TracOnWindows/Advanced]. |
| 294 | |
| 295 | === Using CA !SiteMinder Authentication |
| 296 | |
| 297 | Setup CA !SiteMinder to protect your Trac login URL, for example `/trac/login`. Also, make sure the policy is set to include the HTTP_REMOTE_USER variable. If your site allows it, you can set this in `LocalConfig.conf`: |
| 298 | {{{#!apache |
| 299 | RemoteUserVar="WHATEVER_IT_SHOULD_BE" |
| 300 | SetRemoteUser="YES" |
| 301 | }}} |
| 302 | |
| 303 | The specific variable is site-dependent. Ask your site administrator. If your site does not allow the use of `LocalConfig.conf` for security reasons, have your site administrator set the policy on the server to set REMOTE_USER. |
| 304 | |
| 305 | Also add a !LogOffUri parameter to the agent configuration, for example `/trac/logout`. |
| 306 | |
| 307 | Then modify the trac.wsgi script generated using `trac-admin <env> deploy <dir>` to add the following lines, which extract the `HTTP_REMOTE_USER` variable and set it to `REMOTE_USER`: |
| 308 | |
| 309 | {{{#!python |
| 310 | def application(environ, start_request): |
| 311 | # Set authenticated username on CA SiteMinder to REMOTE_USER variable |
| 312 | # strip() is used to remove any spaces on the end of the string |
| 313 | if 'HTTP_SM_USER' in environ: |
| 314 | environ['REMOTE_USER'] = environ['HTTP_REMOTE_USER'].strip() |
| 315 | ... |
| 316 | }}} |
| 317 | |
| 318 | You do not need any Apache "Location" directives. |
| 319 | |
| 320 | === Example: Apache/mod_wsgi with Basic Authentication, Trac being at the root of a virtual host |
| 321 | |
| 322 | Per the mod_wsgi documentation linked to above, here is an example Apache configuration that: |
| 323 | - serves the Trac instance from a virtualhost subdomain |
| 324 | - uses Apache basic authentication for Trac authentication. |
| 325 | |
| 326 | If you want your Trac to be served from eg !http://trac.my-proj.my-site.org, then from the folder eg `/home/trac-for-my-proj`, if you used the command `trac-admin the-env initenv` to create a folder `the-env`, and you used `trac-admin the-env deploy the-deploy` to create a folder `the-deploy`, then first: |
| 327 | |
| 328 | Create the htpasswd file: |
| 329 | {{{#!sh |
| 330 | cd /home/trac-for-my-proj/the-env |
| 331 | htpasswd -c htpasswd firstuser |
| 332 | ### and add more users to it as needed: |
| 333 | htpasswd htpasswd seconduser |
| 334 | }}} |
| 335 | |
| 336 | Keep the file above your document root for security reasons. |
| 337 | |
| 338 | Create this file for example `/etc/apache2/sites-enabled/trac.my-proj.my-site.org.conf` on Ubuntu with the following content: |
| 339 | |
| 340 | {{{#!apache |
| 341 | <Directory /home/trac-for-my-proj/the-deploy/cgi-bin/trac.wsgi> |
| 342 | WSGIApplicationGroup %{GLOBAL} |
| 343 | Order deny,allow |
| 344 | Allow from all |
| 345 | </Directory> |
| 346 | |
| 347 | <VirtualHost *:80> |
| 348 | ServerName trac.my-proj.my-site.org |
| 349 | DocumentRoot /home/trac-for-my-proj/the-env/htdocs/ |
| 350 | WSGIScriptAlias / /home/trac-for-my-proj/the-deploy/cgi-bin/trac.wsgi |
| 351 | <Location '/'> |
| 352 | AuthType Basic |
| 353 | AuthName "Trac" |
| 354 | AuthUserFile /home/trac-for-my-proj/the-env/htpasswd |
| 355 | Require valid-user |
| 356 | </Location> |
| 357 | </VirtualHost> |
| 358 | |
| 359 | }}} |
| 360 | |
| 361 | For subdomains to work you would probably also need to alter `/etc/hosts` and add A-Records to your host's DNS. |
| 362 | |
| 363 | == Troubleshooting |
| 364 | |
| 365 | === Use a recent version |
| 366 | |
| 367 | Please use either version 1.6, 2.4 or later of `mod_wsgi`. Versions prior to 2.4 in the 2.X branch have problems with some Apache configurations that use WSGI file wrapper extension. This extension is used in Trac to serve up attachments and static media files such as style sheets. If you are affected by this problem, attachments will appear to be empty and formatting of HTML pages will appear not to work due to style sheet files not loading properly. Another frequent symptom is that binary attachment downloads are truncated. See mod_wsgi tickets [https://code.google.com/archive/p/modwsgi/issues/100 #100] and [https://code.google.com/archive/p/modwsgi/issues/132 #132]. |
| 368 | |
| 369 | '''Note''': using mod_wsgi 2.5 and Python 2.6.1 gave an Internal Server Error on my system (Apache 2.2.11 and Trac 0.11.2.1). Upgrading to Python 2.6.2 (as suggested [http://www.mail-archive.com/modwsgi@googlegroups.com/msg01917.html here]) solved this for me[[BR]]-- Graham Shanks |
| 370 | |
| 371 | If you plan to use `mod_wsgi` in embedded mode on Windows or with the MPM worker on Linux, then you will need version 3.4 or greater. See [trac:#10675] for details. |
| 372 | |
| 373 | === Getting Trac to work nicely with SSPI and 'Require Group' |
| 374 | |
| 375 | If you have set Trac up on Apache, Win32 and configured SSPI, but added a 'Require group' option to your Apache configuration, then the SSPIOmitDomain option is probably not working. If it is not working, your usernames in Trac probably look like 'DOMAIN\user' rather than 'user'. |
| 376 | |
| 377 | This WSGI script fixes that: |
| 378 | {{{#!python |
| 379 | import os |
| 380 | import trac.web.main |
| 381 | |
| 382 | os.environ['TRAC_ENV'] = '/usr/local/trac/mysite' |
| 383 | os.environ['PYTHON_EGG_CACHE'] = '/usr/local/trac/mysite/eggs' |
| 384 | |
| 385 | def application(environ, start_response): |
| 386 | if "\\" in environ['REMOTE_USER']: |
| 387 | environ['REMOTE_USER'] = environ['REMOTE_USER'].split("\\", 1)[1] |
| 388 | return trac.web.main.dispatch_request(environ, start_response) |
| 389 | }}} |
| 390 | |
| 391 | === Trac with PostgreSQL |
| 392 | |
| 393 | When using the mod_wsgi adapter with multiple Trac instances and PostgreSQL (or MySQL?) as the database, the server ''may'' create a lot of open database connections and thus PostgreSQL processes. |
| 394 | |
| 395 | A somewhat brutal workaround is to disable connection pooling in Trac. This is done by setting `poolable = False` in `trac.db.postgres_backend` on the `PostgreSQLConnection` class. |
| 396 | |
| 397 | But it is not necessary to edit the source of Trac. The following lines in `trac.wsgi` will also work: |
| 398 | |
| 399 | {{{#!python |