You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 4-6.RSVP
Socket
Book a DemoInstallSign in
Socket

TracHackergotchi

Package Overview
Dependencies
Maintainers
2
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

TracHackergotchi

Adds user-specific icons to the Trac timeline view.

1.2
pipPyPI
Maintainers
2

Notes

Adds user-specific icons to the timeline view.

.. image:: http://trac-hacks.org/raw-attachment/wiki/HackergotchiPlugin/hackergotchi.png

Providers

Identicon

Locally generate identicons__ using the author information. This provider requires PIL__ to be installed.

__ http://www.docuverse.com/blog/donpark/2007/01/18/visual-security-9-block-ip-identification __ http://pythonware.com/products/pil/

Identicon implementation is courtesy of Shin Adachi <shn@glucose.jp>_.

Gravatar

Uses the Gravatar.com__ service to generate images.

__ http://gravatar.com

Configuration

All configuration options go in the [hackergotchi] section.

providers : optional, default: GravatarHackergotchiProvider, IdenticonHackergotchiProvider Order to try providers when looking for an image. Any providers enabled but not listed will be tried in a pseudo-random order.

gravatar_default : optional, default: identicon Value to pass along to Gravatar to use if the email doesn't match anything. Valid values are identicon, monsterid, wavatar, or a URL to an image. In the first three cases, a icon will be procedurally generated.

To enable the plugin::

[components]
hackergotchi.* = enabled

Example

To never use the Gravatar provider::

[hackergotchi]
providers = IdenticonHackergotchiProvider

[components]
hackergotchi.* = enabled
hackergotchi.providers.GravatarHackergotchiProvider = disabled

Keywords

trac plugin timeline identicon hackergotchi

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts