Changes between Version 102 and Version 103 of XmlRpcPlugin
- Timestamp:
- May 23, 2015, 8:47:49 AM (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
XmlRpcPlugin
v102 v103 2 2 3 3 = Trac XML-RPC Plugin 4 5 Remote Procedure Call plugin for Trac 0.10 (not actively maintained) and 0.11/0.12/1.0/++ (trunk).6 4 7 5 == Description … … 19 17 Protocol and method documentation for the latest version of the plugin can be found [/rpc here]. 20 18 21 == Todo19 === Todo 22 20 23 21 Outstanding tasks are roadmap, timeline, user management, for example get a (filtered) user list to assign a task in [http://eclipse.org/mylyn/ mylyn]), plugin management, plus probably more. 24 22 25 == Bugs/Feature Requests == 26 27 Existing bugs and feature requests for XmlRpcPlugin are [query:status!=closed&component=XmlRpcPlugin&order=priority here]. If you have any issues, create a [/newticket?component=XmlRpcPlugin&owner=osimons&cc=olemis new ticket]. 23 == Bugs/Feature Requests 24 25 Existing bugs and feature requests for XmlRpcPlugin are [query:status!=closed&component=XmlRpcPlugin&order=priority here]. 26 27 If you have any issues, create a [/newticket?component=XmlRpcPlugin&owner=osimons&cc=olemis new ticket]. 28 28 29 29 [[TicketQuery(component=XmlRpcPlugin&group=type,format=progress)]] … … 35 35 Experimental features and work in progress can be found at a [http://bitbucket.org/osimons/trac-rpc-mq/ patches repository hosted by Bitbucket]. Work in progress is developed using [http://hgbook.red-bean.com/read/managing-change-with-mercurial-queues.html Mercurial Queues]. 36 36 37 For enhanced compatibility with [wiki: bloodhound Apache™ Bloodhound]>=0.6 download''BloodhoundRPC'' fork from [https://bitbucket.org/olemis/bloodhound-rpc this repository] and check out `bloodhound_rpc` branch.37 For enhanced compatibility with [wiki:ApacheBloodhound Apache™ Bloodhound] >= 0.6 download the ''BloodhoundRPC'' fork from [https://bitbucket.org/olemis/bloodhound-rpc this repository] and check out `bloodhound_rpc` branch. 38 38 39 39 == Installation … … 52 52 If you want it to be installed for all Trac environments, then depending on the version of Trac you are running: 53 53 54 {{{ 55 #!sh 54 {{{#!sh 56 55 easy_install -Z -U http://trac-hacks.org/svn/xmlrpcplugin/trunk # 0.11/0.12/1.0/++ 57 56 easy_install -Z -U http://trac-hacks.org/svn/xmlrpcplugin/0.10 # 0.10 … … 63 62 You will also need to enable the plugin in your `trac.ini` file: 64 63 65 {{{ 66 #!ini 64 {{{#!ini 67 65 [components] 68 66 tracrpc.* = enabled … … 75 73 If you have the AccountManagerPlugin enabled and you followed their advice/example to disable the standard login module as follows: 76 74 77 {{{ 78 #!ini 75 {{{#!ini 79 76 [components] 80 77 trac.web.auth.LoginModule = disabled … … 83 80 then the /login/xmlrpc URL for authorized access will not work as expected. Every access will look like anonymous access. 84 81 85 ~~You can use the HttpAuthPlugin to correct this.~~86 87 82 The recommended approach to make it work is to add the following configuration in TracIni: 88 83 89 {{{ 90 #!ini 84 {{{#!ini 91 85 [account-manager] 92 86 environ_auth_overwrite = false … … 113 107 Obtain and print a list of XML-RPC exported functions available to my user: 114 108 115 {{{ 116 #!python 109 {{{#!python 117 110 import xmlrpclib 118 111 … … 127 120 The same example using `system.multicall()`. This reduces network and server load by compacting all of the `system.methodHelp()` calls into one HTTP POST. 128 121 129 {{{ 130 #!python 122 {{{#!python 131 123 import xmlrpclib 132 124 … … 147 139 List all tickets that are owned by athomas, using the XML-RPC multicall system to issue multiple RPC calls with one HTTP request: 148 140 149 {{{ 150 #!python 141 {{{#!python 151 142 import xmlrpclib 152 143 … … 161 152 Access the Wiki with [http://www.jspwiki.org/Wiki.jsp?page=WikiRPCInterface2 WikiRPC]: 162 153 163 {{{ 164 #!python 154 {{{#!python 165 155 import xmlrpclib 166 156 … … 180 170 Add an attachment to WikiStart: 181 171 182 {{{ 183 #!python 172 {{{#!python 184 173 import xmlrpclib 185 174 … … 193 182 One can use digest authentication if you know the realm that you are connecting to. This shows up in the login box "server says '<realm'". 194 183 195 {{{ 196 #!python 184 {{{#!python 197 185 class HTTPSDigestTransport(xmlrpclib.SafeTransport): 198 186 """