Am Dienstag, 25. Juni 2019 20:22:09 UTC+2 schrieb RjOllos:
>
>
> On Tue, Jun 25, 2019 at 10:44 AM Mo <burcher...@gmail.com <javascript:>> 
> wrote:
>
>> Hi, we migrated from Trac 1.2 to 1.2.3. We also switched from webserver 
>> htpasswd to AccountManagerPlugin using htdigest.
>>
>
> Did you remove the handler (Location directive) for /login in your web 
> server configuration? If not, the web server will intercept and route the 
> request.
>

That solved it, thanks.


> Please share you [account-manager] section from trac.ini 
>

[account-manager]
allow_delete_account = disabled
htdigest_file = /mnt/data/trac/projects/trac/trac.htdigest
htdigest_realm = trac
login_attempt_max_count = 3
password_store = HtDigestStore
persistent_sessions = enabled
reset_password = enabled
user_lock_time = 30

However, self registration is not possible. For instance, I did trac-admin 
... session delete ThisUser.
Then we try to register ThisUser, and Trac says the user already exists:

Warning: Another account or group already exists, who's name differs from 
ThisUser only by case or is identical. 

I try to filter the relevant log lines:

Trac[main] DEBUG: Dispatching <RequestWithSession "POST '/register'">
Trac[main] DEBUG: Chosen handler is <Component 
acct_mgr.register.RegistrationModule>
Trac[session] DEBUG: Retrieving session for ID '731b3375eb2b2e1ea2a15538'
Trac[chrome] DEBUG: Prepare chrome data for request
Trac[perm] DEBUG: No policy allowed anonymous performing DISCUSSION_VIEW on 
None
Trac[perm] DEBUG: No policy allowed anonymous performing XML_RPC on None
Trac[perm] DEBUG: No policy allowed anonymous performing ROADMAP_VIEW on 
None
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_VIEW on 
<Resource 'ticket'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_CREATE on 
None
Trac[perm] DEBUG: No policy allowed anonymous performing SEARCH_VIEW on None
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_VIEW on None
Trac[perm] DEBUG: No policy allowed anonymous performing DISCUSSION_ADMIN 
on None
Trac[perm] DEBUG: No policy allowed anonymous performing 
ACCTMGR_CONFIG_ADMIN on None
Trac[perm] DEBUG: No policy allowed anonymous performing ACCTMGR_USER_ADMIN 
on None
Trac[perm] DEBUG: No policy allowed anonymous performing 
VERSIONCONTROL_ADMIN on <Resource u'admin:versioncontrol/repository'>
Trac[perm] DEBUG: No policy allowed anonymous performing 
PROJECT_SETTINGS_VIEW on <Resource 'projects'>
Trac[perm] DEBUG: No policy allowed anonymous performing TRAC_ADMIN on 
<Resource u'admin:general/basics'>
Trac[perm] DEBUG: No policy allowed anonymous performing TRAC_ADMIN on 
<Resource u'admin:general/logging'>
Trac[perm] DEBUG: No policy allowed anonymous performing PERMISSION_GRANT 
on <Resource u'admin:general/perm'>
Trac[perm] DEBUG: No policy allowed anonymous performing PERMISSION_REVOKE 
on <Resource u'admin:general/perm'>
Trac[perm] DEBUG: No policy allowed anonymous performing TRAC_ADMIN on 
<Resource u'admin:general/plugin'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/components'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/milestones'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/versions'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/priority'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/resolution'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/severity'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/type'>
Trac[perm] DEBUG: No policy allowed anonymous performing BLOG_ADMIN on 
<Resource 'blog'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
None
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_ADMIN on 
<Resource u'admin:ticket/workflowadmin'>
Trac[perm] DEBUG: No policy allowed anonymous performing REPORT_VIEW on 
<Resource u'report:-1'>
Trac[perm] DEBUG: No policy allowed anonymous performing TIMELINE_VIEW on 
<Resource 'timeline'>
Trac[perm] DEBUG: No policy allowed anonymous performing WIKI_VIEW on 
<Resource u'wiki:WikiStart'>
Trac[perm] DEBUG: No policy allowed anonymous performing WIKI_VIEW on 
<Resource u'wiki:TracGuide'>
Trac[perm] DEBUG: No policy allowed anonymous performing BLOG_VIEW on 
<Resource 'blog'>
Trac[perm] DEBUG: No policy allowed anonymous performing TICKET_VIEW_HOURS 
on None
Trac[perm] DEBUG: No policy allowed anonymous performing QUIET_MODE on None
Trac[main] DEBUG: Rendering response from handler
Trac[perm] DEBUG: No policy allowed anonymous performing EMAIL_VIEW on None
Trac[XMailEMailModule] DEBUG: +++++++++++++++ init EMailEventHandler
Trac[main] DEBUG: Dispatching <RequestWithSession "GET 
'/wikiextras/dynamicboxes.css'">
Trac[main] DEBUG: Chosen handler is <Component tracwikiextras.boxes.Boxes>
Trac[session] DEBUG: Retrieving session for ID '731b3375eb2b2e1ea2a15538'

-- 
You received this message because you are subscribed to the Google Groups "Trac 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to trac-users+unsubscr...@googlegroups.com.
To post to this group, send email to trac-users@googlegroups.com.
Visit this group at https://groups.google.com/group/trac-users.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/trac-users/d8b82468-b100-400d-88a3-476312937551%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to