Diff for /doc/build/Attic/install.html between versions 1.5 and 1.17

version 1.5, 2000/11/01 16:08:55 version 1.17, 2002/04/26 13:17:51
Line 1 Line 1
 <HTML>  <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
 <HEAD>   "http://www.w3.org/TR/html4/loose.dtd">
 <TITLE>LON-CAPA Installation</TITLE>  <!-- The LearningOnline Network with CAPA -->
 </HEAD>  <!-- $Id$ -->
 <BODY>  <html>
 <H1>LON-CAPA Installation</H1>  <head>
 <H3>Current Installation Procedure</H3>  <title>LON-CAPA Installation</title>
 <P>  <!-- pdfahref install.pdf -->
 Scott Harrison  <!-- button INSTALL -->
 </P>  </head>
 <P>  <body bgcolor='#ffffff'>
 Last updated: 11/01/2000  <!-- preamble start -->
 </P>  <br />&nbsp;
 <P>  <p>
 This is the current list of steps to support LON-CAPA installation.  These steps have  You will need to check all the following things to ensure proper
 been tested.  installation of your LON-CAPA system.
 <OL>  <ul>
 <LI>Get Redhat 6.2 on a CD by  <li><a href="#wwwuser">
 <UL>  Creating a user 'www'</a></li>
 <LI>Using a RedHat 6.2 CD  <li><a href="#shadow">
 <LI>Downloading a RedHat 6.2 <A HREF="http://install.lon-capa.org/3.1/currentcdimage">CD image</A> and burning a CD  Make a LON-CAPA system work with shadow passwords</a></li>
 <LI>Or, alternatively do a network install from a <A HREF="http://install.lon-capa.org/3.1/currentcdsource">  <li><a href="#install">
 RedHat 6.2 CD source tree</A>.  You need to burn a boot floppy disk with a network boot image;  Installing LON-CAPA files</a></li>
 <A HREF="http://install.lon-capa.org/3.1/currentcdsource/images/bootnet-20000407.img">  <li><a href="#checkrpms">
 bootnet-20000407.img</A>.  (Download the image file; insert a blank floppy disk; and type a  Checking your Linux RPMs</a></li>
 command similar to: <TT>dd if=bootnet-20000407.img of=/dev/fd0</TT>).  For installation, you  <li><a href="#mysql">
 need to specify <TT>http://www.lon-capa.org</TT> as your download URL, and <TT>/install/3.1/currentcdsource</TT>  Configuring the MySQL database</a></li>
 as the source location.  <li><a href="#testing">
 </UL>  Testing to see if the LON-CAPA server is operational</a></li>
 <LI>Install RedHat 6.2  </ul>
 <UL>  <br />&nbsp;
 <LI><B>Important: Do a "GNOME Workstation Install" and go with their default list of packages</B>  <!-- preamble end -->
 <LI><B>Important: Make sure you add a user "www"</B>  <!-- maintext start -->
 </UL>  <a name="wwwuser" />
 <LI>After installation, install extra RPMs/upgrades by downloading all files from  <h3>Creating a user 'www'</h3>
 <A HREF="http://install.lon-capa.org/3.1/SupplementalRPMS/">  <p>
 http://install.lon-capa.org/3.1/SupplementalRPMS</A>.  Execute the following command to create a user named 'www' on your
 <UL>  LON-CAPA server:
 <LI>Use this command to install the RPMs you download: <TT>rpm -Uvh --force *.rpm</TT>.  </p>
 </UL>  <table bgcolor="#aaaaaa" border="1"><tr><td>
 <LI>Remove extra RPMs by downloading and running the script   <tt>/usr/sbin/useradd www</tt>
 <A HREF="http://install.lon-capa.org/3.1/scripts/remove_extra.sh">  </td></tr></table>
 http://install.lon-capa.org/3.1/scripts/remove_extra.sh</A> as root.  <a name="shadow" />
 <LI>After installing the supplemental RPMS, install a final RPM set by downloading all files from  <h3>Make a LON-CAPA system work with shadow passwords</h3>
 <A HREF="http://install.lon-capa.org/3.1/FinalRPMS/">  <p>
 http://install.lon-capa.org/3.1/FinalRPMS</A>.  <table border="1">
 <UL>  <tr><th>Step #</th><th>Description</th></tr>
 <LI>Use this command to install the RPMs you download: <TT>rpm -Uvh --force *.rpm</TT>.  <tr><td>
 </UL>  <font size="+1">1</font>
 <LI>Configure needed files.  </td><td>
 <UL>  <p>Is your system using shadow passwords? (Note: LON-CAPA will
 <LI>Currently, reconfiguration must be handled manually and involves an administrator  work with either MD5/non-MD5 configured systems).  If your
 altering configuration files present throughout the system.  For a list of these  system is not using shadow passwords, then do not perform
 files and their descriptions, visit <A HREF="http://install.lon-capa.org/3.1/loncapafiles/loncapafiles.html">  any of the additional steps.  If your system is using shadow
 http://install.lon-capa.org/3.1/loncapafiles/loncapafiles.html</A>.  passwords, then you will need to perform the additional steps below.
 </UL>  </p>
 <LI>Important files are /etc/httpd/conf/access.conf, /etc/ntp.conf, /etc/krb.conf,    <p>
 /home/httpd/lonTabs/spare.tab, /home/httpd/lonTabs/hosts.tab (if setting up a cluster different  <strong>How to detect:</strong>
 than MSU's).  <br />command: <tt>cat /etc/passwd | grep ':x:'</tt>
 <LI>Unshadow passwords  </p>
 <UL>  <p>If there is output such as "<tt>root:x:0:0:root:/root:/bin/bash</tt>",
 <PRE>You can do this by these 5 steps:  then your system is using shadow passwords and you will need to continue with
 1. enter the system command, as "root", pwunconv  the steps below.
 2. enter the system command, as "root", grpunconv  </p>
 3. Set the following to be the /etc/pam.d/login file on your system  </td></tr>
 #%PAM-1.0  <tr><td>
 auth       required     /lib/security/pam_securetty.so  <font size='+1'>2</font>
 auth       required     /lib/security/pam_pwdb.so shadow nullok  </td><td>
 auth       required     /lib/security/pam_nologin.so  <p><strong>Retrieve the mod_auth_external source</strong> by
 account    required     /lib/security/pam_pwdb.so  running the following command
 password   required     /lib/security/pam_cracklib.so  </p>
 password   required     /lib/security/pam_pwdb.so nullok use_authtok  <p><tt>
 session    required     /lib/security/pam_pwdb.so  wget http://www.wwnet.net/~janc/software/mod_auth_external-2.1.13.tar.gz
 session    optional     /lib/security/pam_console.so  </tt>
 4. Set the following to be the /etc/pam.d/passwd file on your system  </p>
 #%PAM-1.0  </td></tr>
 auth       required     /lib/security/pam_pwdb.so shadow nullok  <tr><td>
 account    required     /lib/security/pam_pwdb.so  <font size='+1'>3</font>
 password   required     /lib/security/pam_cracklib.so retry=3  </td><td>
 password   required     /lib/security/pam_pwdb.so use_authtok nullok  <p><strong>Unpack the mod_auth_external source</strong> by
 5. Set/reset passwords.  As "root" use 'passwd', and 'passwd www'  running the following command
 to change the important passwords.  This creates crypt-processible  </p>
 passwords in /etc/passwd.  <p>
 </PRE>  <tt>tar xzvf mod_auth_external-2.1.13.tar.gz</tt>
 </UL>  </p>
 <LI>Run, as root, <TT>ln -s /etc/mime.types /etc/httpd/conf/mime.types</TT>  </td></tr>
 <LI>Run, as root, <TT>/etc/rc.d/init.d/httpd start</TT>.  <tr><td>
 <LI>Run, as root, <TT>/etc/rc.d/init.d/loncontrol start</TT>.  <font size='+1'>4</font>
 <LI>After 10 minutes, you should be able to check the file <TT>/home/httpd/html/lon-status/index.html</TT>  </td><td>
 to see if your machine has been successfully set up.  <p><strong>Go to the <tt>pwauth</tt> directory</strong> by
 </UL>  running the following command
 </OL>  </p>
 </P>  <p>
 <H3>Future Installation Procedure (not yet implemented)</H3>  <tt>cd mod_auth_external-2.1.13/pwauth/</tt>
 <P>  </p>
 In the future, LON-CAPA Installation will be distributed on a CD complete with a  </td></tr>
 customized interface.  Many elements for doing this have been coded, and are in place, but  <tr><td>
 it awaits completion.  <font size='+1'>5</font>
 </P>  </td><td>
 </BODY>  <p><strong>Edit <tt>config.h</tt> and change SERVER_UIDS definition</strong>
 </HTML>  </p>
   <p>
   Determine the user id of 'www':
   <br /><tt>grep ^www /etc/passwd | cut -d':' -f3</tt>
   <br />
   Change the line
   <br /><tt>#define SERVER_UIDS 99       /* user "nobody" */</tt>
   <br />to be
   <br /><tt>#define SERVER_UIDS 513      /* user "www" */</tt>
   <br />where in this example 513 corresponds to the user id of 'www'.
   </p>
   </td></tr>
   <tr><td>
   <font size='+1'>6</font>
   </td><td>
   <p><strong>Compile the <tt>pwauth</tt> executable</strong> by
   running the following command
   </p>
   <p>
   <tt>make</tt>
   </p>
   </td></tr>
   <tr><td>
   <font size='+1'>7</font>
   </td><td>
   <p><strong>Install <tt>pwauth</tt></strong> by doing the following
   </p>
   <p>
   <tt>cp pwauth /usr/local/sbin/</tt>
   <br /><tt>chmod 6755 /usr/local/sbin/pwauth</tt>
   </p>
   <p>
   Edit (creating the file) /etc/pam.d/pwauth to have the contents:
   <pre>
           auth       required     /lib/security/pam_pwdb.so shadow nullok
           auth       required     /lib/security/pam_nologin.so
           account    required     /lib/security/pam_pwdb.so
   </pre>
   </p>
   </td></tr>
   </table>
   </p>
   <a name="install" />
   <h3>Installing LON-CAPA files</h3>
   <p>
   Download the most current
   <a href="http://install.lon-capa.org/versions/current/loncapa.tar.gz">
   loncapa.tar.gz</a>.
   </p>
   <p>
   The <strong>UPDATE</strong> command will refresh your filesystem with all
   the latest LON-CAPA software.
   </p>
   <table bgcolor="#aaaaaa" border="1">
   <tr><td><tt>./UPDATE</tt></td></tr>
   </table>
   <a name="checkrpms" />
   <h3>Checking your Linux RPMs</h3>
   <p>
   The <strong>CHECKRPMS</strong> command will check the RPMs on your machine
   against an FTP repository.
   </p>
   <table bgcolor="#aaaaaa" border="1">
   <tr><td><tt>./CHECKRPMS</tt></td></tr>
   </table>
   <a name="mysql" />
   <h3>Configuring the MySQL database</h3>
   <p>
   The following commands describe how to configure the MySQL database
   on your LON-CAPA server.
   </p>
   <table bgcolor="#aaaaaa" border="1"><tr><td>
   <pre>
   Enter the mysql shell---
   mysql -u root -p mysql
   
   Run these commands---
   CREATE DATABASE loncapa;
   
   INSERT INTO user (Host, User, Password)
   VALUES ('localhost','www',password('SOMEPASSWORD'));
   
   GRANT ALL PRIVILEGES ON *.* TO www@localhost;
   
   FLUSH PRIVILEGES;
   
   shell> mysql -u root mysql
   mysql> SET PASSWORD FOR root@localhost=PASSWORD('new_password');
   </pre>
   </td></tr></table>
   <a name="testing" />
   <h3>Testing to see if the LON-CAPA server is operational</h3>
   <p>
   The <strong>TEST</strong> command will check the installation software,
   the perl libraries on your system, the MySQL database, and
   will also automatically test the real-time operation of the 
   LON-CAPA Apache web server.
   </p>
   <table bgcolor="#aaaaaa" border="1">
   <tr><td><tt>./TEST</tt></td></tr>
   </table>
   <p>
   Using the <strong>TEST</strong> command will likely
   be an iterative process.
   It is normal to expect that the <strong>TEST</strong> command
   will recommend you perform various steps to ensure optimal
   performance of your LON-CAPA server.
   </p>
   <!-- maintext end -->
   </body>
   </html>

Removed from v.1.5  
changed lines
  Added in v.1.17


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>