2017-05-23 23:04:54 +02:00
|
|
|
from typing import Optional
|
|
|
|
|
2016-06-16 08:44:01 +02:00
|
|
|
# Zulip Settings intended to be set by a system administrator.
|
|
|
|
#
|
|
|
|
# See http://zulip.readthedocs.io/en/latest/settings.html for
|
|
|
|
# detailed technical documentation on the Zulip settings system.
|
|
|
|
#
|
2013-11-14 05:14:18 +01:00
|
|
|
### MANDATORY SETTINGS
|
2015-08-21 05:40:53 +02:00
|
|
|
#
|
|
|
|
# These settings MUST be set in production. In a development environment,
|
|
|
|
# sensible default values will be used.
|
2013-10-23 23:28:03 +02:00
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
# The user-accessible Zulip hostname for this installation, e.g.
|
2017-02-16 23:03:14 +01:00
|
|
|
# zulip.example.com. This should match what users will put in their
|
|
|
|
# web browser. If you want to allow multiple hostnames, add the rest
|
|
|
|
# to ALLOWED_HOSTS.
|
2017-05-12 23:14:23 +02:00
|
|
|
#
|
|
|
|
# If you need to access the server on a specific port, you should set
|
|
|
|
# EXTERNAL_HOST to e.g. zulip.example.com:1234 here.
|
2015-08-21 05:40:53 +02:00
|
|
|
EXTERNAL_HOST = 'zulip.example.com'
|
2013-10-17 16:33:04 +02:00
|
|
|
|
2017-02-16 23:03:14 +01:00
|
|
|
# A comma-separated list of strings representing the host/domain names
|
|
|
|
# that your users will enter in their browsers to access your Zulip
|
|
|
|
# server. This is a security measure to prevent an attacker from
|
|
|
|
# poisoning caches and triggering password reset emails with links to
|
|
|
|
# malicious hosts by submitting requests with a fake HTTP Host
|
|
|
|
# header. See Django's documentation here:
|
|
|
|
# <https://docs.djangoproject.com/en/1.9/ref/settings/#allowed-hosts>.
|
|
|
|
# Zulip adds 'localhost' and '127.0.0.1' to the list automatically.
|
|
|
|
#
|
|
|
|
# The default should work unless you are using multiple hostnames or
|
|
|
|
# connecting directly to your server's IP address. If this is set
|
2017-05-12 23:14:23 +02:00
|
|
|
# wrong, all requests will get a 400 "Bad Request" error.
|
|
|
|
#
|
|
|
|
# Note that these should just be hostnames, without port numbers.
|
|
|
|
ALLOWED_HOSTS = [EXTERNAL_HOST.split(":")[0]]
|
2017-02-16 23:03:14 +01:00
|
|
|
|
2017-06-28 06:03:17 +02:00
|
|
|
# The email address for the person or team who maintains the Zulip
|
|
|
|
# installation. Note that this is a public-facing email address; it may
|
|
|
|
# appear on 404 pages, is used as the sender's address for many automated
|
|
|
|
# emails, and is advertised as a support address. An email address like
|
|
|
|
# support@example.com is totally reasonable, as is admin@example.com.
|
2017-06-26 19:43:32 +02:00
|
|
|
# Do not put a display name; e.g. 'support@example.com', not
|
|
|
|
# 'Zulip Support <support@example.com>'.
|
2015-08-21 08:07:52 +02:00
|
|
|
ZULIP_ADMINISTRATOR = 'zulip-admin@example.com'
|
2013-11-13 15:59:59 +01:00
|
|
|
|
2017-02-16 23:04:57 +01:00
|
|
|
# Configure the outgoing SMTP server below. You will need working
|
|
|
|
# SMTP to complete the installation process, in addition to sending
|
|
|
|
# email address confirmations, missed message notifications, onboarding
|
|
|
|
# follow-ups, and other user needs. If you do not have an SMTP server
|
|
|
|
# already, we recommend services intended for developers such as Mailgun.
|
|
|
|
#
|
|
|
|
# To configure SMTP, you will need to complete the following steps:
|
|
|
|
#
|
|
|
|
# (1) Fill out the outgoing email sending configuration below.
|
|
|
|
#
|
|
|
|
# (2) Put the SMTP password for EMAIL_HOST_USER in
|
|
|
|
# /etc/zulip/zulip-secrets.conf as email_password.
|
|
|
|
#
|
|
|
|
# If you are using a gmail account to send outgoing email, you
|
|
|
|
# will likely need to read this Google support answer and configure
|
|
|
|
# that account as "less secure":
|
|
|
|
# https://support.google.com/accounts/answer/6010255
|
|
|
|
#
|
|
|
|
# You can quickly test your sending email configuration using:
|
|
|
|
# su zulip
|
|
|
|
# /home/zulip/deployments/current/manage.py send_test_email username@example.com
|
|
|
|
#
|
|
|
|
# A common problem is hosting providers that block outgoing SMTP traffic.
|
|
|
|
#
|
|
|
|
# With the exception of reading EMAIL_HOST_PASSWORD from
|
|
|
|
# email_password in the Zulip secrets file, Zulip uses Django's
|
|
|
|
# standard EmailBackend, so if you're having issues, you may want to
|
|
|
|
# search for documentation on using your email provider with Django.
|
|
|
|
EMAIL_HOST = 'smtp.gmail.com'
|
|
|
|
EMAIL_HOST_USER = ''
|
|
|
|
EMAIL_PORT = 587
|
|
|
|
EMAIL_USE_TLS = True
|
2017-06-30 00:56:28 +02:00
|
|
|
# The noreply address to be used as the sender for certain generated emails.
|
|
|
|
# Messages sent to this address could contain sensitive user data and should
|
2017-06-26 19:43:32 +02:00
|
|
|
# not be delivered anywhere. Do not put a display name;
|
|
|
|
# e.g. 'noreply@example.com', not 'Zulip <noreply@example.com>'.
|
|
|
|
NOREPLY_EMAIL_ADDRESS = "noreply@" + EXTERNAL_HOST.split(":")[0]
|
2017-02-16 23:04:57 +01:00
|
|
|
|
|
|
|
|
2017-06-09 05:59:07 +02:00
|
|
|
## OPTIONAL SETTINGS
|
|
|
|
|
|
|
|
|
2017-02-22 06:12:12 +01:00
|
|
|
### AUTHENTICATION SETTINGS
|
|
|
|
#
|
2013-11-13 15:59:59 +01:00
|
|
|
# Enable at least one of the following authentication backends.
|
2016-07-13 01:17:16 +02:00
|
|
|
# See http://zulip.readthedocs.io/en/latest/prod-authentication-methods.html
|
|
|
|
# for documentation on our authentication backends.
|
2013-11-13 15:59:59 +01:00
|
|
|
AUTHENTICATION_BACKENDS = (
|
2017-07-09 01:54:38 +02:00
|
|
|
'zproject.backends.EmailAuthBackend', # Email and password; just requires SMTP setup
|
|
|
|
# 'zproject.backends.GoogleMobileOauth2Backend', # Google Apps, setup below
|
|
|
|
# 'zproject.backends.GitHubAuthBackend', # GitHub auth, setup below
|
|
|
|
# 'zproject.backends.ZulipLDAPAuthBackend', # LDAP, setup below
|
|
|
|
# 'zproject.backends.ZulipRemoteUserBackend', # Local SSO, setup docs on readthedocs
|
2017-01-24 06:34:26 +01:00
|
|
|
)
|
2013-11-13 15:59:59 +01:00
|
|
|
|
2016-07-29 21:23:58 +02:00
|
|
|
# To enable Google authentication, you need to do the following:
|
2015-09-28 19:05:58 +02:00
|
|
|
#
|
2017-07-24 11:29:59 +02:00
|
|
|
# (1) Visit https://console.developers.google.com, click on Credentials on
|
|
|
|
# the left sidebar and create a Oauth2 client ID
|
2015-09-28 19:05:58 +02:00
|
|
|
# e.g. https://zulip.example.com/accounts/login/google/done/.
|
|
|
|
#
|
2017-07-24 11:29:59 +02:00
|
|
|
# (2) Go to the Library (left sidebar), then under "Social APIs" click on
|
2015-09-28 19:05:58 +02:00
|
|
|
# "Google+ API" and click the button to enable the API.
|
|
|
|
#
|
|
|
|
# (3) put your client secret as "google_oauth2_client_secret" in
|
|
|
|
# zulip-secrets.conf, and your client ID right here:
|
2015-09-26 22:50:46 +02:00
|
|
|
# GOOGLE_OAUTH2_CLIENT_ID=<your client ID from Google>
|
|
|
|
|
2016-07-29 21:34:17 +02:00
|
|
|
|
|
|
|
# To enable GitHub authentication, you will need to need to do the following:
|
|
|
|
#
|
|
|
|
# (1) Register an OAuth2 application with GitHub at one of:
|
2017-07-24 11:29:59 +02:00
|
|
|
# https://github.com/settings/developers
|
|
|
|
# https://github.com/organizations/ORGNAME/settings/developers
|
2016-07-29 21:34:17 +02:00
|
|
|
# Specify e.g. https://zulip.example.com/complete/github/ as the callback URL.
|
|
|
|
#
|
|
|
|
# (2) Put your "Client ID" as SOCIAL_AUTH_GITHUB_KEY below and your
|
|
|
|
# "Client secret" as social_auth_github_secret in
|
|
|
|
# /etc/zulip/zulip-secrets.conf.
|
|
|
|
# SOCIAL_AUTH_GITHUB_KEY = <your client ID from GitHub>
|
2016-08-03 09:28:38 +02:00
|
|
|
#
|
|
|
|
# (3) You can also configure the GitHub integration to only allow
|
|
|
|
# members of a particular GitHub team or organization to login to your
|
|
|
|
# Zulip server using GitHub authentication; to enable this, set one of the
|
|
|
|
# two parameters below:
|
|
|
|
# SOCIAL_AUTH_GITHUB_TEAM_ID = <your team id>
|
|
|
|
# SOCIAL_AUTH_GITHUB_ORG_NAME = <your org name>
|
|
|
|
|
2016-07-29 21:34:17 +02:00
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
# If you are using the ZulipRemoteUserBackend authentication backend,
|
|
|
|
# set this to your domain (e.g. if REMOTE_USER is "username" and the
|
|
|
|
# corresponding email address is "username@example.com", set
|
|
|
|
# SSO_APPEND_DOMAIN = "example.com")
|
2017-07-09 01:54:38 +02:00
|
|
|
SSO_APPEND_DOMAIN = None # type: Optional[str]
|
2013-11-13 15:59:59 +01:00
|
|
|
|
2013-11-16 00:47:17 +01:00
|
|
|
|
2017-05-16 22:28:15 +02:00
|
|
|
# Support for mobile push notifications. Setting controls whether
|
|
|
|
# push notifications will be forwarded through a Zulip push
|
|
|
|
# notification bouncer server to the mobile apps. See
|
|
|
|
# https://zulip.readthedocs.io/en/latest/prod-mobile-push-notifications.html
|
|
|
|
# for information on how to sign up for and configure this.
|
2017-07-25 22:53:04 +02:00
|
|
|
#PUSH_NOTIFICATION_BOUNCER_URL = 'https://push.zulipchat.com'
|
2017-05-16 22:28:15 +02:00
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
# Controls whether session cookies expire when the browser closes
|
2013-11-14 05:14:18 +01:00
|
|
|
SESSION_EXPIRE_AT_BROWSER_CLOSE = False
|
|
|
|
|
|
|
|
# Session cookie expiry in seconds after the last page load
|
2017-07-09 01:54:38 +02:00
|
|
|
SESSION_COOKIE_AGE = 60 * 60 * 24 * 7 * 2 # 2 weeks
|
2013-11-14 05:14:18 +01:00
|
|
|
|
2017-01-18 05:52:52 +01:00
|
|
|
# Password strength requirements; learn about configuration at
|
|
|
|
# http://zulip.readthedocs.io/en/latest/security-model.html.
|
|
|
|
# PASSWORD_MIN_LENGTH = 6
|
|
|
|
# PASSWORD_MIN_ZXCVBN_QUALITY = 0.5
|
2017-01-09 18:04:23 +01:00
|
|
|
|
2013-11-25 22:07:37 +01:00
|
|
|
# Controls whether or not there is a feedback button in the UI.
|
2015-08-21 04:42:04 +02:00
|
|
|
ENABLE_FEEDBACK = False
|
2013-11-13 16:59:03 +01:00
|
|
|
|
2017-07-02 03:59:03 +02:00
|
|
|
# Feedback sent by your users will be sent to this email address.
|
2015-08-21 04:42:04 +02:00
|
|
|
FEEDBACK_EMAIL = ZULIP_ADMINISTRATOR
|
2013-11-25 22:07:37 +01:00
|
|
|
|
2017-01-24 07:54:18 +01:00
|
|
|
# Controls whether or not error reports (tracebacks) are emailed to the
|
|
|
|
# server administrators.
|
|
|
|
#ERROR_REPORTING = True
|
|
|
|
# For frontend (JavaScript) tracebacks
|
|
|
|
#BROWSER_ERROR_REPORTING = False
|
2013-11-13 21:35:04 +01:00
|
|
|
|
2013-11-14 14:37:39 +01:00
|
|
|
# Controls whether or not Zulip will provide inline image preview when
|
2017-07-29 15:06:52 +02:00
|
|
|
# a link to an image is referenced in a message. Note: this feature
|
|
|
|
# can also be disabled in a realm's organization settings.
|
|
|
|
#INLINE_IMAGE_PREVIEW = True
|
|
|
|
|
|
|
|
# Controls whether or not Zulip will provide inline previews of
|
|
|
|
# websites that are referenced in links in messages. Note: this feature
|
|
|
|
# can also be disabled in a realm's organization settings.
|
|
|
|
#INLINE_URL_EMBED_PREVIEW = False
|
2013-11-14 14:37:39 +01:00
|
|
|
|
2016-03-10 17:17:40 +01:00
|
|
|
# Controls whether or not Zulip will parse links starting with
|
|
|
|
# "file:///" as a hyperlink (useful if you have e.g. an NFS share).
|
|
|
|
ENABLE_FILE_LINKS = False
|
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
# By default, files uploaded by users and user avatars are stored
|
2015-09-30 03:10:17 +02:00
|
|
|
# directly on the Zulip server. If file storage in Amazon S3 is
|
2015-11-15 22:48:36 +01:00
|
|
|
# desired, you can configure that as follows:
|
|
|
|
#
|
|
|
|
# (1) Set s3_key and s3_secret_key in /etc/zulip/zulip-secrets.conf to
|
|
|
|
# be the S3 access and secret keys that you want to use, and setting
|
|
|
|
# the S3_AUTH_UPLOADS_BUCKET and S3_AVATAR_BUCKET to be the S3 buckets
|
|
|
|
# you've created to store file uploads and user avatars, respectively.
|
2017-07-28 18:29:42 +02:00
|
|
|
# Then restart Zulip (scripts/restart-server).
|
2015-11-15 22:48:36 +01:00
|
|
|
#
|
|
|
|
# (2) Edit /etc/nginx/sites-available/zulip-enterprise to comment out
|
|
|
|
# the nginx configuration for /user_uploads and /user_avatars (see
|
|
|
|
# https://github.com/zulip/zulip/issues/291 for discussion of a better
|
|
|
|
# solution that won't be automatically reverted by the Zulip upgrade
|
|
|
|
# script), and then restart nginx.
|
2016-09-02 21:27:35 +02:00
|
|
|
LOCAL_UPLOADS_DIR = "/home/zulip/uploads"
|
2015-11-15 22:48:36 +01:00
|
|
|
#S3_AUTH_UPLOADS_BUCKET = ""
|
|
|
|
#S3_AVATAR_BUCKET = ""
|
2013-10-23 23:28:03 +02:00
|
|
|
|
2015-11-21 04:08:53 +01:00
|
|
|
# Maximum allowed size of uploaded files, in megabytes. DO NOT SET
|
|
|
|
# ABOVE 80MB. The file upload implementation doesn't support chunked
|
|
|
|
# uploads, so browsers will crash if you try uploading larger files.
|
|
|
|
MAX_FILE_UPLOAD_SIZE = 25
|
|
|
|
|
2013-11-15 16:52:31 +01:00
|
|
|
# Controls whether name changes are completely disabled for this installation
|
|
|
|
# This is useful in settings where you're syncing names from an integrated LDAP/Active Directory
|
|
|
|
NAME_CHANGES_DISABLED = False
|
|
|
|
|
2013-11-15 22:25:02 +01:00
|
|
|
# Controls whether users who have not uploaded an avatar will receive an avatar
|
|
|
|
# from gravatar.com.
|
|
|
|
ENABLE_GRAVATAR = True
|
|
|
|
|
2013-11-18 16:58:39 +01:00
|
|
|
# To override the default avatar image if ENABLE_GRAVATAR is False, place your
|
|
|
|
# custom default avatar image at /home/zulip/local-static/default-avatar.png
|
|
|
|
# and uncomment the following line.
|
|
|
|
#DEFAULT_AVATAR_URI = '/local-static/default-avatar.png'
|
|
|
|
|
2015-12-10 23:52:52 +01:00
|
|
|
# To access an external postgres database you should define the host name in
|
|
|
|
# REMOTE_POSTGRES_HOST, you can define the password in the secrets file in the
|
|
|
|
# property postgres_password, and the SSL connection mode in REMOTE_POSTGRES_SSLMODE
|
|
|
|
# Different options are:
|
|
|
|
# disable: I don't care about security, and I don't want to pay the overhead of encryption.
|
|
|
|
# allow: I don't care about security, but I will pay the overhead of encryption if the server insists on it.
|
|
|
|
# prefer: I don't care about encryption, but I wish to pay the overhead of encryption if the server supports it.
|
2016-08-13 16:57:01 +02:00
|
|
|
# require: I want my data to be encrypted, and I accept the overhead. I trust that the network will make sure
|
|
|
|
# I always connect to the server I want.
|
|
|
|
# verify-ca: I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server
|
|
|
|
# that I trust.
|
|
|
|
# verify-full: I want my data encrypted, and I accept the overhead. I want to be sure that I connect to a server
|
|
|
|
# I trust, and that it's the one I specify.
|
2015-12-10 23:52:52 +01:00
|
|
|
#REMOTE_POSTGRES_HOST = 'dbserver.example.com'
|
|
|
|
#REMOTE_POSTGRES_SSLMODE = 'require'
|
|
|
|
|
2016-05-11 19:01:53 +02:00
|
|
|
# If you want to set custom TOS, set the path to your markdown file, and uncomment
|
|
|
|
# the following line.
|
|
|
|
# TERMS_OF_SERVICE = '/etc/zulip/terms.md'
|
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
### TWITTER INTEGRATION
|
|
|
|
|
|
|
|
# Zulip supports showing inline Tweet previews when a tweet is linked
|
|
|
|
# to in a message. To support this, Zulip must have access to the
|
|
|
|
# Twitter API via OAuth. To obtain the various access tokens needed
|
|
|
|
# below, you must register a new application under your Twitter
|
|
|
|
# account by doing the following:
|
2013-10-25 21:19:30 +02:00
|
|
|
#
|
|
|
|
# 1. Log in to http://dev.twitter.com.
|
|
|
|
# 2. In the menu under your username, click My Applications. From this page, create a new application.
|
2015-09-29 20:26:34 +02:00
|
|
|
# 3. Click on the application you created and click "create my access token".
|
|
|
|
# 4. Fill in the values for twitter_consumer_key, twitter_consumer_secret, twitter_access_token_key,
|
|
|
|
# and twitter_access_token_secret in /etc/zulip/zulip-secrets.conf.
|
2013-10-25 21:19:30 +02:00
|
|
|
|
2013-11-14 05:25:45 +01:00
|
|
|
### EMAIL GATEWAY INTEGRATION
|
|
|
|
|
2015-10-15 21:51:40 +02:00
|
|
|
# The Email gateway integration supports sending messages into Zulip
|
|
|
|
# by sending an email. This is useful for receiving notifications
|
|
|
|
# from third-party services that only send outgoing notifications via
|
|
|
|
# email. Once this integration is configured, each stream will have
|
|
|
|
# an email address documented on the stream settings page an emails
|
|
|
|
# sent to that address will be delivered into the stream.
|
|
|
|
#
|
|
|
|
# There are two ways to configure email mirroring in Zulip:
|
2014-02-03 20:22:56 +01:00
|
|
|
# 1. Local delivery: A MTA runs locally and passes mail directly to Zulip
|
|
|
|
# 2. Polling: Checks an IMAP inbox every minute for new messages.
|
|
|
|
#
|
2015-10-15 21:51:40 +02:00
|
|
|
# The local delivery configuration is preferred for production because
|
|
|
|
# it supports nicer looking email addresses and has no cron delay,
|
|
|
|
# while the polling mechanism is better for testing/developing this
|
|
|
|
# feature because it doesn't require a public-facing IP/DNS setup.
|
2013-11-14 05:25:45 +01:00
|
|
|
#
|
2015-10-15 21:51:40 +02:00
|
|
|
# The main email mirror setting is the email address pattern, where
|
|
|
|
# you specify the email address format you'd like the integration to
|
|
|
|
# use. It should be one of the following:
|
|
|
|
# %s@zulip.example.com (for local delivery)
|
|
|
|
# username+%s@example.com (for polling if EMAIL_GATEWAY_LOGIN=username@example.com)
|
2013-11-12 16:19:38 +01:00
|
|
|
EMAIL_GATEWAY_PATTERN = ""
|
2014-02-03 20:22:56 +01:00
|
|
|
#
|
2015-10-15 21:51:40 +02:00
|
|
|
# If you are using local delivery, EMAIL_GATEWAY_PATTERN is all you need
|
|
|
|
# to change in this file. You will also need to enable the Zulip postfix
|
|
|
|
# configuration to support local delivery by adding
|
|
|
|
# , zulip::postfix_localmail
|
2015-11-23 22:18:26 +01:00
|
|
|
# to puppet_classes in /etc/zulip/zulip.conf and then running
|
|
|
|
# `scripts/zulip-puppet-apply -f` to do the installation.
|
2015-10-15 21:51:40 +02:00
|
|
|
#
|
|
|
|
# If you are using polling, you will need to setup an IMAP email
|
|
|
|
# account dedicated to Zulip email gateway messages. The model is
|
|
|
|
# that users will send emails to that account via an address of the
|
|
|
|
# form username+%s@example.com (which is what you will set as
|
|
|
|
# EMAIL_GATEWAY_PATTERN); your email provider should deliver those
|
|
|
|
# emails to the username@example.com inbox. Then you run in a cron
|
2016-07-28 16:08:52 +02:00
|
|
|
# job `./manage.py email_mirror` (see puppet/zulip/files/cron.d/email-mirror),
|
2015-10-15 21:51:40 +02:00
|
|
|
# which will check that inbox and batch-process any new messages.
|
|
|
|
#
|
|
|
|
# You will need to configure authentication for the email mirror
|
2015-11-23 22:20:32 +01:00
|
|
|
# command to access the IMAP mailbox below and in zulip-secrets.conf.
|
2014-02-03 20:22:56 +01:00
|
|
|
#
|
2016-07-25 14:16:59 +02:00
|
|
|
# The IMAP login; username here and password as email_gateway_password in
|
2015-11-23 22:20:32 +01:00
|
|
|
# zulip-secrets.conf.
|
2013-11-12 16:19:38 +01:00
|
|
|
EMAIL_GATEWAY_LOGIN = ""
|
|
|
|
# The IMAP server & port to connect to
|
|
|
|
EMAIL_GATEWAY_IMAP_SERVER = ""
|
|
|
|
EMAIL_GATEWAY_IMAP_PORT = 993
|
|
|
|
# The IMAP folder name to check for emails. All emails sent to EMAIL_GATEWAY_PATTERN above
|
|
|
|
# must be delivered to this folder
|
|
|
|
EMAIL_GATEWAY_IMAP_FOLDER = "INBOX"
|
|
|
|
|
2013-11-21 01:30:20 +01:00
|
|
|
### LDAP integration configuration
|
2015-09-30 08:12:48 +02:00
|
|
|
# Zulip supports retrieving information about users via LDAP, and
|
2015-10-13 22:22:27 +02:00
|
|
|
# optionally using LDAP as an authentication mechanism.
|
|
|
|
#
|
|
|
|
# In either configuration, you will need to do the following:
|
|
|
|
#
|
|
|
|
# * Fill in the LDAP configuration options below so that Zulip can
|
|
|
|
# connect to your LDAP server
|
|
|
|
#
|
|
|
|
# * Setup the mapping between email addresses (used as login names in
|
|
|
|
# Zulip) and LDAP usernames. There are two supported ways to setup
|
|
|
|
# the username mapping:
|
|
|
|
#
|
|
|
|
# (A) If users' email addresses are in LDAP, set
|
|
|
|
# LDAP_APPEND_DOMAIN = None
|
|
|
|
# AUTH_LDAP_USER_SEARCH to lookup users by email address
|
|
|
|
#
|
|
|
|
# (B) If LDAP only has usernames but email addresses are of the form
|
|
|
|
# username@example.com, you should set:
|
|
|
|
# LDAP_APPEND_DOMAIN = example.com and
|
|
|
|
# AUTH_LDAP_USER_SEARCH to lookup users by username
|
|
|
|
#
|
|
|
|
# You can quickly test whether your configuration works by running:
|
|
|
|
# ./manage.py query_ldap username@example.com
|
|
|
|
# From the root of your Zulip installation; if your configuration is working
|
|
|
|
# that will output the full name for your user.
|
|
|
|
#
|
|
|
|
# -------------------------------------------------------------
|
|
|
|
#
|
|
|
|
# If you are using LDAP for authentication, you will need to enable
|
|
|
|
# the zproject.backends.ZulipLDAPAuthBackend auth backend in
|
|
|
|
# AUTHENTICATION_BACKENDS above. After doing so, you should be able
|
|
|
|
# to login to Zulip by entering your email address and LDAP password
|
|
|
|
# on the Zulip login form.
|
|
|
|
#
|
|
|
|
# If you are using LDAP to populate names in Zulip, once you finish
|
|
|
|
# configuring this integration, you will need to run:
|
|
|
|
# ./manage.py sync_ldap_user_data
|
|
|
|
# To sync names for existing users; you may want to run this in a cron
|
|
|
|
# job to pick up name changes made on your LDAP server.
|
2013-11-21 01:30:20 +01:00
|
|
|
import ldap
|
|
|
|
from django_auth_ldap.config import LDAPSearch, GroupOfNamesType
|
|
|
|
|
|
|
|
# URI of your LDAP server. If set, LDAP is used to prepopulate a user's name in
|
|
|
|
# Zulip. Example: "ldaps://ldap.example.com"
|
|
|
|
AUTH_LDAP_SERVER_URI = ""
|
|
|
|
|
2015-11-23 22:28:00 +01:00
|
|
|
# This DN will be used to bind to your server. If unset, anonymous
|
|
|
|
# binds are performed. If set, you need to specify the password as
|
|
|
|
# 'auth_ldap_bind_password' in zulip-secrets.conf.
|
2013-11-21 01:30:20 +01:00
|
|
|
AUTH_LDAP_BIND_DN = ""
|
|
|
|
|
2013-11-22 22:58:22 +01:00
|
|
|
# Specify the search base and the property to filter on that corresponds to the
|
2013-11-21 01:30:20 +01:00
|
|
|
# username.
|
|
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearch("ou=users,dc=example,dc=com",
|
2016-12-03 00:04:17 +01:00
|
|
|
ldap.SCOPE_SUBTREE, "(uid=%(user)s)")
|
2013-11-21 01:30:20 +01:00
|
|
|
|
|
|
|
# If the value of a user's "uid" (or similar) property is not their email
|
|
|
|
# address, specify the domain to append here.
|
2017-07-09 01:54:38 +02:00
|
|
|
LDAP_APPEND_DOMAIN = None # type: Optional[str]
|
2013-11-21 01:30:20 +01:00
|
|
|
|
2013-11-22 22:58:22 +01:00
|
|
|
# This map defines how to populate attributes of a Zulip user from LDAP.
|
2013-11-21 01:30:20 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP = {
|
2016-12-02 08:15:16 +01:00
|
|
|
# Populate the Django user's name from the LDAP directory.
|
2013-11-21 01:30:20 +01:00
|
|
|
"full_name": "cn",
|
|
|
|
}
|
2015-08-21 01:27:35 +02:00
|
|
|
|
2016-04-28 07:32:27 +02:00
|
|
|
# The default CAMO_URI of '/external_content/' is served by the camo
|
|
|
|
# setup in the default Voyager nginx configuration. Setting CAMO_URI
|
|
|
|
# to '' will disable the Camo integration.
|
|
|
|
CAMO_URI = '/external_content/'
|
2016-01-21 12:52:24 +01:00
|
|
|
|
|
|
|
# RabbitMQ configuration
|
|
|
|
#
|
|
|
|
# By default, Zulip connects to rabbitmq running locally on the machine,
|
|
|
|
# but Zulip also supports connecting to RabbitMQ over the network;
|
|
|
|
# to use a remote RabbitMQ instance, set RABBITMQ_HOST here.
|
|
|
|
# RABBITMQ_HOST = "localhost"
|
|
|
|
# To use another rabbitmq user than the default 'zulip', set RABBITMQ_USERNAME here.
|
|
|
|
# RABBITMQ_USERNAME = 'zulip'
|
|
|
|
|
|
|
|
# Memcached configuration
|
|
|
|
#
|
|
|
|
# By default, Zulip connects to memcached running locally on the machine,
|
|
|
|
# but Zulip also supports connecting to memcached over the network;
|
|
|
|
# to use a remote Memcached instance, set MEMCACHED_LOCATION here.
|
|
|
|
# Format HOST:PORT
|
|
|
|
# MEMCACHED_LOCATION = 127.0.0.1:11211
|
|
|
|
|
|
|
|
# Redis configuration
|
|
|
|
#
|
|
|
|
# By default, Zulip connects to redis running locally on the machine,
|
|
|
|
# but Zulip also supports connecting to redis over the network;
|
2016-08-01 04:45:53 +02:00
|
|
|
# to use a remote Redis instance, set REDIS_HOST here.
|
2016-01-21 12:52:24 +01:00
|
|
|
# REDIS_HOST = '127.0.0.1'
|
|
|
|
# For a different redis port set the REDIS_PORT here.
|
|
|
|
# REDIS_PORT = 6379
|
2016-08-01 04:51:00 +02:00
|
|
|
# If you set redis_password in zulip-secrets.conf, Zulip will use that password
|
|
|
|
# to connect to the redis server.
|
2016-01-21 12:52:24 +01:00
|
|
|
|
|
|
|
# Controls whether Zulip will rate-limit user requests.
|
|
|
|
# RATE_LIMITING = True
|