This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/passbook/root/settings.py

367 lines
11 KiB
Python
Raw Normal View History

2018-11-11 12:41:48 +00:00
"""
Django settings for passbook project.
Generated by 'django-admin startproject' using Django 2.1.3.
For more information on this file, see
https://docs.djangoproject.com/en/2.1/topics/settings/
For the full list of settings and their values, see
https://docs.djangoproject.com/en/2.1/ref/settings/
"""
2018-11-16 08:10:35 +00:00
import importlib
import logging
2018-11-11 12:41:48 +00:00
import os
2019-02-11 16:36:36 +00:00
import sys
2018-11-11 12:41:48 +00:00
2019-04-04 19:48:50 +00:00
from celery.schedules import crontab
from django.contrib import messages
2019-04-04 19:48:50 +00:00
from sentry_sdk import init as sentry_init
from sentry_sdk.integrations.celery import CeleryIntegration
from sentry_sdk.integrations.django import DjangoIntegration
from sentry_sdk.integrations.logging import LoggingIntegration
2018-11-11 12:41:48 +00:00
from passbook import __version__
2018-11-16 08:10:35 +00:00
from passbook.lib.config import CONFIG
from passbook.lib.sentry import before_send
2018-11-16 08:10:35 +00:00
2018-11-11 12:41:48 +00:00
VERSION = __version__
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
BASE_DIR = os.path.dirname(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
2018-12-09 21:12:41 +00:00
STATIC_ROOT = BASE_DIR + '/static'
2018-11-11 12:41:48 +00:00
# Quick-start development settings - unsuitable for production
# See https://docs.djangoproject.com/en/2.1/howto/deployment/checklist/
# SECURITY WARNING: keep the secret key used in production secret!
SECRET_KEY = CONFIG.get('secret_key')
2018-11-11 12:41:48 +00:00
# SECURITY WARNING: don't run with debug turned on in production!
2019-02-08 13:57:59 +00:00
DEBUG = CONFIG.get('debug')
2018-11-11 12:41:48 +00:00
INTERNAL_IPS = ['127.0.0.1']
# ALLOWED_HOSTS = CONFIG.get('domains', []) + [CONFIG.get('primary_domain')]
ALLOWED_HOSTS = ['*']
2019-03-14 17:01:41 +00:00
SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
2018-11-11 12:41:48 +00:00
2018-11-16 08:10:35 +00:00
LOGIN_URL = 'passbook_core:auth-login'
# CSRF_FAILURE_VIEW = 'passbook.core.views.errors.CSRFErrorView.as_view'
2018-11-11 12:41:48 +00:00
# Custom user model
AUTH_USER_MODEL = 'passbook_core.User'
2018-12-09 20:06:36 +00:00
CSRF_COOKIE_NAME = 'passbook_csrf'
SESSION_COOKIE_NAME = 'passbook_session'
SESSION_COOKIE_DOMAIN = CONFIG.get('primary_domain')
SESSION_ENGINE = "django.contrib.sessions.backends.cache"
SESSION_CACHE_ALIAS = "default"
2018-12-09 20:06:36 +00:00
LANGUAGE_COOKIE_NAME = 'passbook_language'
2018-11-11 12:41:48 +00:00
AUTHENTICATION_BACKENDS = [
'django.contrib.auth.backends.ModelBackend',
2018-11-11 12:41:48 +00:00
]
# Application definition
INSTALLED_APPS = [
'django.contrib.admin',
'django.contrib.auth',
'django.contrib.contenttypes',
'django.contrib.sessions',
'django.contrib.messages',
'django.contrib.staticfiles',
2019-03-08 14:49:45 +00:00
'django.contrib.postgres',
2018-11-16 10:41:14 +00:00
'rest_framework',
2019-02-21 15:06:57 +00:00
'drf_yasg',
'passbook.core.apps.PassbookCoreConfig',
'passbook.admin.apps.PassbookAdminConfig',
'passbook.api.apps.PassbookAPIConfig',
'passbook.audit.apps.PassbookAuditConfig',
'passbook.lib.apps.PassbookLibConfig',
'passbook.ldap.apps.PassbookLdapConfig',
'passbook.oauth_client.apps.PassbookOAuthClientConfig',
'passbook.oauth_provider.apps.PassbookOAuthProviderConfig',
'passbook.saml_idp.apps.PassbookSAMLIDPConfig',
'passbook.otp.apps.PassbookOTPConfig',
'passbook.captcha_factor.apps.PassbookCaptchaFactorConfig',
'passbook.hibp_policy.apps.PassbookHIBPConfig',
'passbook.pretend.apps.PassbookPretendConfig',
2019-03-03 16:12:05 +00:00
'passbook.password_expiry_policy.apps.PassbookPasswordExpiryPolicyConfig',
'passbook.suspicious_policy.apps.PassbookSuspiciousPolicyConfig',
'passbook.app_gw.apps.PassbookApplicationApplicationGatewayConfig',
2018-11-11 12:41:48 +00:00
]
# Message Tag fix for bootstrap CSS Classes
MESSAGE_TAGS = {
messages.DEBUG: 'primary',
messages.INFO: 'info',
messages.SUCCESS: 'success',
messages.WARNING: 'warning',
messages.ERROR: 'danger',
}
2018-11-16 08:10:35 +00:00
REST_FRAMEWORK = {
# Use Django's standard `django.contrib.auth` permissions,
# or allow read-only access for unauthenticated users.
'DEFAULT_PERMISSION_CLASSES': [
'rest_framework.permissions.DjangoModelPermissionsOrAnonReadOnly'
]
}
CACHES = {
"default": {
"BACKEND": "django_redis.cache.RedisCache",
"LOCATION": "redis://%s" % CONFIG.get('redis'),
"OPTIONS": {
"CLIENT_CLASS": "django_redis.client.DefaultClient",
}
}
}
2018-11-11 12:41:48 +00:00
MIDDLEWARE = [
'django.contrib.sessions.middleware.SessionMiddleware',
2019-04-11 11:43:08 +00:00
'whitenoise.middleware.WhiteNoiseMiddleware',
'django.contrib.auth.middleware.AuthenticationMiddleware',
'passbook.app_gw.middleware.ApplicationGatewayMiddleware',
'django.middleware.security.SecurityMiddleware',
2018-11-11 12:41:48 +00:00
'django.middleware.common.CommonMiddleware',
'django.middleware.csrf.CsrfViewMiddleware',
'django.contrib.messages.middleware.MessageMiddleware',
'django.middleware.clickjacking.XFrameOptionsMiddleware',
]
2019-06-25 16:11:08 +00:00
ROOT_URLCONF = 'passbook.root.urls'
2018-11-11 12:41:48 +00:00
TEMPLATES = [
{
'BACKEND': 'django.template.backends.django.DjangoTemplates',
'DIRS': [],
'APP_DIRS': True,
'OPTIONS': {
'context_processors': [
'django.template.context_processors.debug',
'django.template.context_processors.request',
'django.contrib.auth.context_processors.auth',
'django.contrib.messages.context_processors.messages',
],
},
},
]
WSGI_APPLICATION = 'passbook.core.wsgi.application'
# Database
# https://docs.djangoproject.com/en/2.1/ref/settings/#databases
2018-12-18 12:26:47 +00:00
DATABASES = {}
for db_alias, db_config in CONFIG.get('databases').items():
DATABASES[db_alias] = {
'ENGINE': db_config.get('engine'),
'HOST': db_config.get('host'),
'NAME': db_config.get('name'),
'USER': db_config.get('user'),
'PASSWORD': db_config.get('password'),
'OPTIONS': db_config.get('options', {}),
2018-11-11 12:41:48 +00:00
}
# Password validation
# https://docs.djangoproject.com/en/2.1/ref/settings/#auth-password-validators
AUTH_PASSWORD_VALIDATORS = [
{
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
},
{
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
},
]
# Internationalization
# https://docs.djangoproject.com/en/2.1/topics/i18n/
LANGUAGE_CODE = 'en-us'
TIME_ZONE = 'UTC'
USE_I18N = True
USE_L10N = True
USE_TZ = True
# Celery settings
# Add a 10 minute timeout to all Celery tasks.
CELERY_TASK_SOFT_TIME_LIMIT = 600
CELERY_TIMEZONE = TIME_ZONE
CELERY_BEAT_SCHEDULE = {}
CELERY_CREATE_MISSING_QUEUES = True
CELERY_TASK_DEFAULT_QUEUE = 'passbook'
2019-03-11 19:46:19 +00:00
CELERY_BROKER_URL = 'amqp://%s' % CONFIG.get('rabbitmq')
CELERY_RESULT_BACKEND = 'rpc://'
CELERY_ACKS_LATE = True
CELERY_BROKER_HEARTBEAT = 0
2019-04-04 19:48:50 +00:00
CELERY_BEAT_SCHEDULE = {
'cleanup-expired-nonces': {
'task': 'passbook.core.tasks.clean_nonces',
'schedule': crontab(hour=1, minute=1)
}
2019-03-03 19:48:31 +00:00
}
2019-04-11 13:30:42 +00:00
if not DEBUG:
sentry_init(
dsn="https://55b5dd780bc14f4c96bba69b7a9abbcc@sentry.services.beryju.org/8",
2019-04-11 13:30:42 +00:00
integrations=[
DjangoIntegration(),
CeleryIntegration(),
LoggingIntegration(
level=logging.INFO,
event_level=logging.ERROR
)
],
send_default_pii=True,
before_send=before_send,
release='p2@%s' % __version__
2019-04-11 13:30:42 +00:00
)
2018-11-11 12:41:48 +00:00
# Static files (CSS, JavaScript, Images)
# https://docs.djangoproject.com/en/2.1/howto/static-files/
STATIC_URL = '/static/'
2019-04-11 11:43:08 +00:00
STATICFILES_STORAGE = 'whitenoise.storage.CompressedManifestStaticFilesStorage'
2018-11-11 12:41:48 +00:00
with CONFIG.cd('log'):
LOGGING = {
'version': 1,
'disable_existing_loggers': True,
'formatters': {
'verbose': {
'format': ('%(asctime)s %(levelname)-8s %(name)-55s '
'%(funcName)-20s %(message)s'),
},
'color': {
'()': 'colorlog.ColoredFormatter',
'format': ('%(log_color)s%(asctime)s %(levelname)-8s %(name)-55s '
'%(funcName)-20s %(message)s'),
'log_colors': {
'DEBUG': 'bold_black',
'INFO': 'white',
'WARNING': 'yellow',
'ERROR': 'red',
'CRITICAL': 'bold_red',
'SUCCESS': 'green',
},
}
},
'handlers': {
'console': {
'level': CONFIG.get('level').get('console'),
'class': 'logging.StreamHandler',
'formatter': 'color',
},
'syslog': {
'level': CONFIG.get('level').get('file'),
'class': 'logging.handlers.SysLogHandler',
'formatter': 'verbose',
'address': (CONFIG.get('syslog').get('host'),
CONFIG.get('syslog').get('port'))
},
'file': {
'level': CONFIG.get('level').get('file'),
'class': 'logging.FileHandler',
'formatter': 'verbose',
'filename': CONFIG.get('file'),
},
2019-04-13 14:04:48 +00:00
'queue': {
'level': CONFIG.get('level').get('console'),
'class': 'passbook.lib.log.QueueListenerHandler',
'handlers': [
'cfg://handlers.console',
# 'cfg://handlers.syslog',
'cfg://handlers.file',
],
}
2018-11-11 12:41:48 +00:00
},
'loggers': {
'passbook': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'DEBUG',
'propagate': True,
},
'django': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'INFO',
'propagate': True,
},
'tasks': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'DEBUG',
'propagate': True,
},
'cherrypy': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'DEBUG',
'propagate': True,
},
'oauthlib': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'DEBUG',
'propagate': True,
},
'oauth2_provider': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
2018-11-11 12:41:48 +00:00
'level': 'DEBUG',
'propagate': True,
},
2019-04-11 11:43:49 +00:00
'daphne': {
2019-04-13 14:04:48 +00:00
'handlers': ['queue'],
'level': 'INFO',
2019-04-11 11:43:49 +00:00
'propagate': True,
}
2018-11-11 12:41:48 +00:00
}
}
2019-02-11 16:36:36 +00:00
TEST = False
TEST_RUNNER = 'xmlrunner.extra.djangotestrunner.XMLTestRunner'
TEST_OUTPUT_VERBOSE = 2
TEST_OUTPUT_FILE_NAME = 'unittest.xml'
if any('test' in arg for arg in sys.argv):
LOGGING = None
TEST = True
2019-02-26 13:24:50 +00:00
CELERY_TASK_ALWAYS_EAGER = True
2019-02-11 16:36:36 +00:00
_DISALLOWED_ITEMS = ['INSTALLED_APPS', 'MIDDLEWARE', 'AUTHENTICATION_BACKENDS']
2018-11-16 08:10:35 +00:00
# Load subapps's INSTALLED_APPS
for _app in INSTALLED_APPS:
if _app.startswith('passbook') and \
not _app.startswith('passbook.core'):
if 'apps' in _app:
_app = '.'.join(_app.split('.')[:-2])
try:
app_settings = importlib.import_module("%s.settings" % _app)
INSTALLED_APPS.extend(getattr(app_settings, 'INSTALLED_APPS', []))
MIDDLEWARE.extend(getattr(app_settings, 'MIDDLEWARE', []))
AUTHENTICATION_BACKENDS.extend(getattr(app_settings, 'AUTHENTICATION_BACKENDS', []))
for _attr in dir(app_settings):
if not _attr.startswith('__') and _attr not in _DISALLOWED_ITEMS:
globals()[_attr] = getattr(app_settings, _attr)
2018-11-16 08:10:35 +00:00
except ImportError:
pass
if DEBUG:
INSTALLED_APPS.append('debug_toolbar')
MIDDLEWARE.append('debug_toolbar.middleware.DebugToolbarMiddleware')