258 lines
6.8 KiB
Python
258 lines
6.8 KiB
Python
"""
|
|
Django settings for ipv6work project.
|
|
|
|
Generated by 'django-admin startproject' using Django 2.1.2.
|
|
|
|
For more information on this file, see
|
|
https://docs.djangoproject.com/en/2.1/topics/settings/
|
|
|
|
For the full list of settings and their values, see
|
|
https://docs.djangoproject.com/en/2.1/ref/settings/
|
|
"""
|
|
|
|
import os
|
|
import ldap
|
|
import logging
|
|
from decouple import config, Csv
|
|
from django_auth_ldap.config import LDAPSearch, LDAPSearchUnion
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
|
BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
|
|
|
|
|
|
# Quick-start development settings - unsuitable for production
|
|
# See https://docs.djangoproject.com/en/2.1/howto/deployment/checklist/
|
|
|
|
# SECURITY WARNING: keep the secret key used in production secret!
|
|
SECRET_KEY = '+0t^onasc-b+_ry$!6@hpf4o79rw6m%q7dow5#ia+@nla&2@0-'
|
|
|
|
# SECURITY WARNING: don't run with debug turned on in production!
|
|
DEBUG = config('DEBUG', cast=bool, default=False)
|
|
|
|
ALLOWED_HOSTS = config('ALLOWED_HOSTS', cast=Csv(), default="*")
|
|
CSRF_TRUSTED_ORIGINS = ['.ungleich.ch']
|
|
|
|
# Application definition
|
|
|
|
INSTALLED_APPS = [
|
|
'django.contrib.admin',
|
|
'django.contrib.auth',
|
|
'django.contrib.contenttypes',
|
|
'django.contrib.sessions',
|
|
'django.contrib.messages',
|
|
'django.contrib.staticfiles',
|
|
]
|
|
|
|
# Libraries and other apps
|
|
INSTALLED_APPS += [
|
|
'crispy_forms',
|
|
|
|
# Used for autocomplete and dynamic creation of tags.
|
|
# Ff this widget is required for admin, place these
|
|
# before 'django.contrib.admin' app
|
|
'dal',
|
|
'dal_select2',
|
|
|
|
# for authorization, rules are autodiscovered from rules.py in apps
|
|
'rules.apps.AutodiscoverRulesConfig',
|
|
]
|
|
|
|
# Our apps
|
|
INSTALLED_APPS += [
|
|
'jobs',
|
|
'users',
|
|
]
|
|
|
|
MIDDLEWARE = [
|
|
'django.middleware.security.SecurityMiddleware',
|
|
'django.contrib.sessions.middleware.SessionMiddleware',
|
|
'django.middleware.common.CommonMiddleware',
|
|
'django.middleware.csrf.CsrfViewMiddleware',
|
|
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
|
'django.contrib.messages.middleware.MessageMiddleware',
|
|
'django.middleware.clickjacking.XFrameOptionsMiddleware'
|
|
]
|
|
|
|
IPV6_EXEMPT_URLS = [r'^$']
|
|
DISABLE_IPV4_BLOCK = config('DISABLE_IPV4_BLOCK', cast=bool, default=False)
|
|
|
|
|
|
ROOT_URLCONF = 'ipv6work.urls'
|
|
|
|
TEMPLATES = [
|
|
{
|
|
'BACKEND': 'django.template.backends.django.DjangoTemplates',
|
|
'DIRS': ['templates/'],
|
|
'APP_DIRS': True,
|
|
'OPTIONS': {
|
|
'context_processors': [
|
|
'django.template.context_processors.debug',
|
|
'django.template.context_processors.request',
|
|
'django.contrib.auth.context_processors.auth',
|
|
'django.contrib.messages.context_processors.messages',
|
|
],
|
|
},
|
|
},
|
|
]
|
|
|
|
WSGI_APPLICATION = 'ipv6work.wsgi.application'
|
|
|
|
|
|
# Database
|
|
# https://docs.djangoproject.com/en/2.1/ref/settings/#databases
|
|
|
|
DATABASES = {
|
|
'default': {
|
|
'ENGINE': config('DATABASE_BACKEND', default='django.db.backends.sqlite3'),
|
|
'NAME': config('DATABASE_NAME', default=os.path.join(BASE_DIR, 'db.sqlite3')),
|
|
}
|
|
}
|
|
|
|
|
|
# Password validation
|
|
# https://docs.djangoproject.com/en/2.1/ref/settings/#auth-password-validators
|
|
|
|
AUTH_PASSWORD_VALIDATORS = [
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
|
|
},
|
|
]
|
|
|
|
AUTHENTICATION_BACKENDS = (
|
|
'rules.permissions.ObjectPermissionBackend',
|
|
'django_auth_ldap.backend.LDAPBackend',
|
|
)
|
|
|
|
USE_X_FORWARDED_HOST = True
|
|
FORCE_SCRIPT_NAME = config('FORCE_SCRIPT_NAME', '/ipv6/work/')
|
|
|
|
LOGIN_URL = 'login'
|
|
LOGOUT_URL = 'logout'
|
|
ROOT_URLCONF = 'ipv6work.urls'
|
|
|
|
|
|
LOGIN_REDIRECT_URL = FORCE_SCRIPT_NAME
|
|
LOGOUT_REDIRECT_URL = FORCE_SCRIPT_NAME
|
|
|
|
# This is necessary because when accessing from dynamicweb.ungleich.ch,
|
|
# the browser tries to access 'favicon.ico' which resets the session as
|
|
# another Django app (dynamicweb) is running on /.
|
|
SESSION_COOKIE_NAME = 'session-ipv6-work'
|
|
|
|
# Internationalization
|
|
# https://docs.djangoproject.com/en/2.1/topics/i18n/
|
|
|
|
LANGUAGE_CODE = 'en-us'
|
|
|
|
TIME_ZONE = 'UTC'
|
|
|
|
USE_I18N = True
|
|
|
|
USE_L10N = True
|
|
|
|
USE_TZ = True
|
|
|
|
|
|
# Static files (CSS, JavaScript, Images)
|
|
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
|
|
|
|
|
STATIC_URL = FORCE_SCRIPT_NAME + 'static/'
|
|
|
|
STATIC_ROOT = os.path.join(BASE_DIR, 'static/')
|
|
|
|
MEDIA_ROOT = os.path.join(BASE_DIR, 'media/')
|
|
MEDIA_URL = FORCE_SCRIPT_NAME + 'media/'
|
|
|
|
CRISPY_TEMPLATE_PACK = 'bootstrap4'
|
|
|
|
|
|
AUTH_LDAP_SERVER_URI = config('AUTH_LDAP_SERVER_URI')
|
|
AUTH_LDAP_BIND_DN = config('AUTH_LDAP_BIND_DN')
|
|
AUTH_LDAP_BIND_PASSWORD = config('AUTH_LDAP_BIND_PASSWORD')
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearchUnion(
|
|
LDAPSearch("ou=users,dc=ungleich,dc=ch",
|
|
ldap.SCOPE_SUBTREE, "(uid=%(user)s)"),
|
|
LDAPSearch("ou=customers,dc=ungleich,dc=ch",
|
|
ldap.SCOPE_SUBTREE, "(uid=%(user)s)"),
|
|
)
|
|
|
|
AUTH_LDAP_USER_ATTR_MAP = {
|
|
'first_name': 'givenName',
|
|
'last_name': 'sn',
|
|
'email': 'mail',
|
|
}
|
|
AUTH_LDAP_ALWAYS_UPDATE_USER = True
|
|
LOGGING = {
|
|
'disable_existing_loggers': False,
|
|
'version': 1,
|
|
'handlers': {
|
|
'console': {
|
|
'class': 'logging.StreamHandler',
|
|
},
|
|
},
|
|
'loggers': {
|
|
'django_auth_ldap': {
|
|
'level': 'DEBUG',
|
|
'handlers': ['console'],
|
|
},
|
|
},
|
|
}
|
|
|
|
LDAP_SEARCH_BASE=config(
|
|
'LDAP_SEARCH_BASE',
|
|
default='ou=users,dc=ungleich,dc=ch'
|
|
)
|
|
|
|
LDAP_MAX_UID_PATH = os.path.join(
|
|
os.path.abspath(os.path.dirname(__file__)),
|
|
'ldap_max_uid_file'
|
|
)
|
|
|
|
LDAP_IPV6_WORK_USER_GROUP = config('LDAP_IPV6_WORK_USER_GROUP', cast=int)
|
|
|
|
LDAP_DEFAULT_START_UID = config(
|
|
'LDAP_DEFAULT_START_UID', cast=int, default=10000
|
|
)
|
|
|
|
if config('ENABLE_DEBUG_LOG', cast=bool, default=False):
|
|
loggers_dict = {}
|
|
MODULES_TO_LOG = config('MODULES_TO_LOG', 'django')
|
|
LOGGING['handlers']['file'] = {
|
|
'level': 'DEBUG',
|
|
'class': 'logging.FileHandler',
|
|
'filename': os.path.join(BASE_DIR, 'debug.log'),
|
|
}
|
|
|
|
if MODULES_TO_LOG is None:
|
|
# set MODULES_TO_LOG to django, if it is not set
|
|
MODULES_TO_LOG = 'django'
|
|
modules_to_log_list = MODULES_TO_LOG.split(',')
|
|
for custom_module in modules_to_log_list:
|
|
logger_item = {
|
|
custom_module: {
|
|
'handlers': ['file'],
|
|
'level': 'DEBUG',
|
|
'propagate': True
|
|
}
|
|
}
|
|
loggers_dict.update(logger_item)
|
|
|
|
LOGGING['loggers'] = loggers_dict
|
|
|
|
if 'ldap3' in modules_to_log_list:
|
|
from ldap3.utils.log import (
|
|
set_library_log_detail_level, OFF, BASIC, NETWORK, EXTENDED
|
|
)
|
|
set_library_log_detail_level(BASIC)
|