2020-06-08 03:58:37 +02:00
|
|
|
import os
|
|
|
|
import sys
|
2020-06-11 00:54:34 +02:00
|
|
|
import time
|
|
|
|
from copy import deepcopy
|
2020-09-15 01:35:44 +02:00
|
|
|
from typing import Any, Dict, List, Tuple, Union
|
2020-06-08 03:58:37 +02:00
|
|
|
from urllib.parse import urljoin
|
|
|
|
|
2020-06-19 00:32:55 +02:00
|
|
|
from django.template.loaders import app_directories
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
import zerver.lib.logging_util
|
2020-09-15 02:01:33 +02:00
|
|
|
from scripts.lib.zulip_tools import get_tornado_ports
|
2022-07-05 22:38:55 +02:00
|
|
|
from zerver.lib.db import TimeTrackingConnection, TimeTrackingCursor
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2020-06-11 00:54:34 +02:00
|
|
|
from .config import (
|
|
|
|
DEPLOY_ROOT,
|
|
|
|
DEVELOPMENT,
|
|
|
|
PRODUCTION,
|
2020-09-15 02:01:33 +02:00
|
|
|
config_file,
|
2020-06-11 00:54:34 +02:00
|
|
|
get_config,
|
|
|
|
get_from_file_if_exists,
|
|
|
|
get_secret,
|
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
from .configured_settings import (
|
|
|
|
ADMINS,
|
|
|
|
ALLOWED_HOSTS,
|
|
|
|
AUTH_LDAP_BIND_DN,
|
|
|
|
AUTH_LDAP_CONNECTION_OPTIONS,
|
|
|
|
AUTH_LDAP_SERVER_URI,
|
2020-06-11 00:54:34 +02:00
|
|
|
AUTHENTICATION_BACKENDS,
|
2020-06-08 03:58:37 +02:00
|
|
|
CAMO_URI,
|
|
|
|
DEBUG,
|
|
|
|
DEBUG_ERROR_REPORTING,
|
|
|
|
EMAIL_BACKEND,
|
|
|
|
EMAIL_HOST,
|
|
|
|
ERROR_REPORTING,
|
|
|
|
EXTERNAL_HOST,
|
2020-06-27 02:37:49 +02:00
|
|
|
EXTERNAL_HOST_WITHOUT_PORT,
|
2020-06-08 03:58:37 +02:00
|
|
|
EXTERNAL_URI_SCHEME,
|
|
|
|
EXTRA_INSTALLED_APPS,
|
|
|
|
GOOGLE_OAUTH2_CLIENT_ID,
|
2022-05-09 04:53:19 +02:00
|
|
|
HOME_NOT_LOGGED_IN,
|
2022-02-10 11:52:34 +01:00
|
|
|
INVITATION_LINK_VALIDITY_DAYS,
|
2020-06-08 03:58:37 +02:00
|
|
|
IS_DEV_DROPLET,
|
|
|
|
LOCAL_UPLOADS_DIR,
|
|
|
|
MEMCACHED_LOCATION,
|
|
|
|
MEMCACHED_USERNAME,
|
|
|
|
REALM_HOSTS,
|
|
|
|
REGISTER_LINK_DISABLED,
|
|
|
|
REMOTE_POSTGRES_HOST,
|
|
|
|
REMOTE_POSTGRES_PORT,
|
|
|
|
REMOTE_POSTGRES_SSLMODE,
|
2021-08-23 15:14:05 +02:00
|
|
|
ROOT_SUBDOMAIN_ALIASES,
|
2020-06-08 03:58:37 +02:00
|
|
|
SENDFILE_BACKEND,
|
2020-07-02 02:20:55 +02:00
|
|
|
SENTRY_DSN,
|
2020-06-26 12:22:48 +02:00
|
|
|
SOCIAL_AUTH_APPLE_APP_ID,
|
2020-06-08 03:58:37 +02:00
|
|
|
SOCIAL_AUTH_APPLE_SERVICES_ID,
|
|
|
|
SOCIAL_AUTH_GITHUB_KEY,
|
|
|
|
SOCIAL_AUTH_GITHUB_ORG_NAME,
|
|
|
|
SOCIAL_AUTH_GITHUB_TEAM_ID,
|
|
|
|
SOCIAL_AUTH_GOOGLE_KEY,
|
|
|
|
SOCIAL_AUTH_SAML_ENABLED_IDPS,
|
|
|
|
SOCIAL_AUTH_SAML_SECURITY_CONFIG,
|
2021-08-23 15:14:05 +02:00
|
|
|
SOCIAL_AUTH_SUBDOMAIN,
|
2020-06-08 03:58:37 +02:00
|
|
|
STATSD_HOST,
|
2020-09-17 00:30:45 +02:00
|
|
|
TORNADO_PORTS,
|
2020-06-08 03:58:37 +02:00
|
|
|
USING_PGROONGA,
|
|
|
|
ZULIP_ADMINISTRATOR,
|
|
|
|
)
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# INITIAL SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Make this unique, and don't share it with anybody.
|
|
|
|
SECRET_KEY = get_secret("secret_key")
|
|
|
|
|
|
|
|
# A shared secret, used to authenticate different parts of the app to each other.
|
|
|
|
SHARED_SECRET = get_secret("shared_secret")
|
|
|
|
|
|
|
|
# We use this salt to hash a user's email into a filename for their user-uploaded
|
|
|
|
# avatar. If this salt is discovered, attackers will only be able to determine
|
|
|
|
# that the owner of an email account has uploaded an avatar to Zulip, which isn't
|
|
|
|
# the end of the world. Don't use the salt where there is more security exposure.
|
|
|
|
AVATAR_SALT = get_secret("avatar_salt")
|
|
|
|
|
|
|
|
# SERVER_GENERATION is used to track whether the server has been
|
|
|
|
# restarted for triggering browser clients to reload.
|
|
|
|
SERVER_GENERATION = int(time.time())
|
|
|
|
|
|
|
|
# Key to authenticate this server to zulip.org for push notifications, etc.
|
|
|
|
ZULIP_ORG_KEY = get_secret("zulip_org_key")
|
|
|
|
ZULIP_ORG_ID = get_secret("zulip_org_id")
|
|
|
|
|
|
|
|
if DEBUG:
|
2021-02-12 08:20:45 +01:00
|
|
|
INTERNAL_IPS = ("127.0.0.1",)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Detect whether we're running as a queue worker; this impacts the logging configuration.
|
2021-02-12 08:20:45 +01:00
|
|
|
if len(sys.argv) > 2 and sys.argv[0].endswith("manage.py") and sys.argv[1] == "process_queue":
|
2020-06-08 03:58:37 +02:00
|
|
|
IS_WORKER = True
|
|
|
|
else:
|
|
|
|
IS_WORKER = False
|
|
|
|
|
|
|
|
|
|
|
|
# This is overridden in test_settings.py for the test suites
|
|
|
|
TEST_SUITE = False
|
|
|
|
# This is overridden in test_settings.py for the test suites
|
2020-09-05 15:37:07 +02:00
|
|
|
PUPPETEER_TESTS = False
|
2020-06-08 03:58:37 +02:00
|
|
|
# This is overridden in test_settings.py for the test suites
|
|
|
|
RUNNING_OPENAPI_CURL_TEST = False
|
|
|
|
# This is overridden in test_settings.py for the test suites
|
|
|
|
GENERATE_STRIPE_FIXTURES = False
|
2020-08-19 12:40:10 +02:00
|
|
|
# This is overridden in test_settings.py for the test suites
|
|
|
|
BAN_CONSOLE_OUTPUT = False
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# These are the settings that we will check that the user has filled in for
|
|
|
|
# production deployments before starting the app. It consists of a series
|
|
|
|
# of pairs of (setting name, default value that it must be changed from)
|
2021-02-12 08:19:30 +01:00
|
|
|
REQUIRED_SETTINGS = [
|
|
|
|
("EXTERNAL_HOST", "zulip.example.com"),
|
|
|
|
("ZULIP_ADMINISTRATOR", "zulip-admin@example.com"),
|
|
|
|
# SECRET_KEY doesn't really need to be here, in
|
|
|
|
# that we set it automatically, but just in
|
|
|
|
# case, it seems worth having in this list
|
|
|
|
("SECRET_KEY", ""),
|
|
|
|
("AUTHENTICATION_BACKENDS", ()),
|
|
|
|
]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
MANAGERS = ADMINS
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# STANDARD DJANGO SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Local time zone for this installation. Choices can be found here:
|
|
|
|
# https://en.wikipedia.org/wiki/List_of_tz_zones_by_name
|
|
|
|
# although not all choices may be available on all operating systems.
|
|
|
|
# In a Windows environment this must be set to your system time zone.
|
2021-02-12 08:20:45 +01:00
|
|
|
TIME_ZONE = "UTC"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Language code for this installation. All choices can be found here:
|
|
|
|
# http://www.i18nguy.com/unicode/language-identifiers.html
|
2021-02-12 08:20:45 +01:00
|
|
|
LANGUAGE_CODE = "en-us"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# If you set this to False, Django will make some optimizations so as not
|
|
|
|
# to load the internationalization machinery.
|
|
|
|
USE_I18N = True
|
|
|
|
|
2022-02-24 21:15:43 +01:00
|
|
|
# If you set this to False, Django will not use time-zone-aware datetimes.
|
2020-06-08 03:58:37 +02:00
|
|
|
USE_TZ = True
|
|
|
|
|
|
|
|
# this directory will be used to store logs for development environment
|
2021-02-12 08:20:45 +01:00
|
|
|
DEVELOPMENT_LOG_DIRECTORY = os.path.join(DEPLOY_ROOT, "var", "log")
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Extend ALLOWED_HOSTS with localhost (needed to RPC to Tornado),
|
2021-02-12 08:20:45 +01:00
|
|
|
ALLOWED_HOSTS += ["127.0.0.1", "localhost"]
|
2020-06-08 03:58:37 +02:00
|
|
|
# ... with hosts corresponding to EXTERNAL_HOST,
|
2020-06-27 02:37:49 +02:00
|
|
|
ALLOWED_HOSTS += [EXTERNAL_HOST_WITHOUT_PORT, "." + EXTERNAL_HOST_WITHOUT_PORT]
|
2020-06-08 03:58:37 +02:00
|
|
|
# ... and with the hosts in REALM_HOSTS.
|
|
|
|
ALLOWED_HOSTS += REALM_HOSTS.values()
|
|
|
|
|
2020-06-11 00:54:34 +02:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
class TwoFactorLoader(app_directories.Loader):
|
2021-08-15 18:32:51 +02:00
|
|
|
def get_dirs(self) -> List[Union[bytes, str]]:
|
2020-06-08 03:58:37 +02:00
|
|
|
dirs = super().get_dirs()
|
2021-01-12 18:51:58 +01:00
|
|
|
return [d for d in dirs if d.match("two_factor/*")]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
MIDDLEWARE = (
|
|
|
|
# With the exception of it's dependencies,
|
|
|
|
# our logging middleware should be the top middleware item.
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.middleware.TagRequests",
|
middleware: Do not trust X-Forwarded-For; use X-Real-Ip, set from nginx.
The `X-Forwarded-For` header is a list of proxies' IP addresses; each
proxy appends the remote address of the host it received its request
from to the list, as it passes the request down. A naïve parsing, as
SetRemoteAddrFromForwardedFor did, would thus interpret the first
address in the list as the client's IP.
However, clients can pass in arbitrary `X-Forwarded-For` headers,
which would allow them to spoof their IP address. `nginx`'s behavior
is to treat the addresses as untrusted unless they match an allowlist
of known proxies. By setting `real_ip_recursive on`, it also allows
this behavior to be applied repeatedly, moving from right to left down
the `X-Forwarded-For` list, stopping at the right-most that is
untrusted.
Rather than re-implement this logic in Django, pass the first
untrusted value that `nginx` computer down into Django via `X-Real-Ip`
header. This allows consistent IP addresses in logs between `nginx`
and Django.
Proxied calls into Tornado (which don't use UWSGI) already passed this
header, as Tornado logging respects it.
2021-03-23 22:40:08 +01:00
|
|
|
"zerver.middleware.SetRemoteAddrFromRealIpHeader",
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.middleware.RequestContext",
|
|
|
|
"zerver.middleware.LogRequests",
|
|
|
|
"zerver.middleware.JsonErrorHandler",
|
|
|
|
"zerver.middleware.RateLimitMiddleware",
|
|
|
|
"zerver.middleware.FlushDisplayRecipientCache",
|
|
|
|
"zerver.middleware.ZulipCommonMiddleware",
|
|
|
|
"django.contrib.sessions.middleware.SessionMiddleware",
|
|
|
|
"zerver.middleware.LocaleMiddleware",
|
2022-07-14 15:34:17 +02:00
|
|
|
"django.contrib.auth.middleware.AuthenticationMiddleware",
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.middleware.HostDomainMiddleware",
|
|
|
|
"django.middleware.csrf.CsrfViewMiddleware",
|
2021-09-10 18:36:56 +02:00
|
|
|
"zerver.middleware.ZulipSCIMAuthCheckMiddleware",
|
2020-06-08 03:58:37 +02:00
|
|
|
# Make sure 2FA middlewares come after authentication middleware.
|
2021-02-12 08:20:45 +01:00
|
|
|
"django_otp.middleware.OTPMiddleware", # Required by two factor auth.
|
|
|
|
"two_factor.middleware.threadlocals.ThreadLocals", # Required by Twilio
|
2020-06-08 03:58:37 +02:00
|
|
|
# Needs to be after CommonMiddleware, which sets Content-Length
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.middleware.FinalizeOpenGraphDescription",
|
2020-06-08 03:58:37 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
AUTH_USER_MODEL = "zerver.UserProfile"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
TEST_RUNNER = "zerver.lib.test_runner.Runner"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
ROOT_URLCONF = "zproject.urls"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Python dotted path to the WSGI application used by Django's runserver.
|
2021-02-12 08:20:45 +01:00
|
|
|
WSGI_APPLICATION = "zproject.wsgi.application"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# A site can include additional installed apps via the
|
|
|
|
# EXTRA_INSTALLED_APPS setting
|
|
|
|
INSTALLED_APPS = [
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.contrib.auth",
|
|
|
|
"django.contrib.contenttypes",
|
|
|
|
"django.contrib.sessions",
|
|
|
|
"django.contrib.staticfiles",
|
|
|
|
"confirmation",
|
|
|
|
"zerver",
|
|
|
|
"social_django",
|
2021-09-10 18:36:56 +02:00
|
|
|
"django_scim",
|
2020-06-08 03:58:37 +02:00
|
|
|
# 2FA related apps.
|
2021-02-12 08:20:45 +01:00
|
|
|
"django_otp",
|
|
|
|
"django_otp.plugins.otp_static",
|
|
|
|
"django_otp.plugins.otp_totp",
|
|
|
|
"two_factor",
|
2022-07-07 01:12:49 +02:00
|
|
|
"two_factor.plugins.phonenumber",
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
if USING_PGROONGA:
|
2021-02-12 08:20:45 +01:00
|
|
|
INSTALLED_APPS += ["pgroonga"]
|
2020-06-08 03:58:37 +02:00
|
|
|
INSTALLED_APPS += EXTRA_INSTALLED_APPS
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
ZILENCER_ENABLED = "zilencer" in INSTALLED_APPS
|
|
|
|
CORPORATE_ENABLED = "corporate" in INSTALLED_APPS
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2020-09-17 00:30:45 +02:00
|
|
|
if not TORNADO_PORTS:
|
|
|
|
TORNADO_PORTS = get_tornado_ports(config_file)
|
2020-09-15 02:01:33 +02:00
|
|
|
TORNADO_PROCESSES = len(TORNADO_PORTS)
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
RUNNING_INSIDE_TORNADO = False
|
|
|
|
|
|
|
|
SILENCED_SYSTEM_CHECKS = [
|
|
|
|
# auth.W004 checks that the UserProfile field named by USERNAME_FIELD has
|
|
|
|
# `unique=True`. For us this is `email`, and it's unique only per-realm.
|
|
|
|
# Per Django docs, this is perfectly fine so long as our authentication
|
|
|
|
# backends support the username not being unique; and they do.
|
2021-11-05 20:26:37 +01:00
|
|
|
# See: https://docs.djangoproject.com/en/3.2/topics/auth/customizing/#django.contrib.auth.models.CustomUser.USERNAME_FIELD
|
2020-06-08 03:58:37 +02:00
|
|
|
"auth.W004",
|
2021-02-14 00:03:40 +01:00
|
|
|
# models.E034 limits index names to 30 characters for Oracle compatibility.
|
|
|
|
# We aren't using Oracle.
|
|
|
|
"models.E034",
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# DATABASE CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Zulip's Django configuration supports 4 different ways to do
|
2020-10-26 22:27:53 +01:00
|
|
|
# PostgreSQL authentication:
|
2020-06-08 03:58:37 +02:00
|
|
|
#
|
|
|
|
# * The development environment uses the `local_database_password`
|
|
|
|
# secret from `zulip-secrets.conf` to authenticate with a local
|
|
|
|
# database. The password is automatically generated and managed by
|
|
|
|
# `generate_secrets.py` during or provision.
|
|
|
|
#
|
|
|
|
# The remaining 3 options are for production use:
|
|
|
|
#
|
2020-10-26 22:27:53 +01:00
|
|
|
# * Using PostgreSQL's "peer" authentication to authenticate to a
|
2020-06-08 03:58:37 +02:00
|
|
|
# database on the local system using one's user ID (processes
|
|
|
|
# running as user `zulip` on the system are automatically
|
|
|
|
# authenticated as database user `zulip`). This is the default in
|
|
|
|
# production. We don't use this in the development environment,
|
|
|
|
# because it requires the developer's user to be called `zulip`.
|
|
|
|
#
|
2020-10-26 22:27:53 +01:00
|
|
|
# * Using password authentication with a remote PostgreSQL server using
|
2020-06-08 03:58:37 +02:00
|
|
|
# the `REMOTE_POSTGRES_HOST` setting and the password from the
|
|
|
|
# `postgres_password` secret.
|
|
|
|
#
|
2020-10-26 22:27:53 +01:00
|
|
|
# * Using passwordless authentication with a remote PostgreSQL server
|
2020-06-08 03:58:37 +02:00
|
|
|
# using the `REMOTE_POSTGRES_HOST` setting and a client certificate
|
|
|
|
# under `/home/zulip/.postgresql/`.
|
|
|
|
#
|
|
|
|
# We implement these options with a default DATABASES configuration
|
|
|
|
# supporting peer authentication, with logic to override it as
|
|
|
|
# appropriate if DEVELOPMENT or REMOTE_POSTGRES_HOST is set.
|
2021-02-12 08:19:30 +01:00
|
|
|
DATABASES: Dict[str, Dict[str, Any]] = {
|
|
|
|
"default": {
|
2021-02-12 08:20:45 +01:00
|
|
|
"ENGINE": "django.db.backends.postgresql",
|
2021-05-25 05:46:09 +02:00
|
|
|
"NAME": get_config("postgresql", "database_name", "zulip"),
|
|
|
|
"USER": get_config("postgresql", "database_user", "zulip"),
|
2021-02-12 08:19:30 +01:00
|
|
|
# Password = '' => peer/certificate authentication (no password)
|
2021-02-12 08:20:45 +01:00
|
|
|
"PASSWORD": "",
|
2021-02-12 08:19:30 +01:00
|
|
|
# Host = '' => connect to localhost by default
|
2021-02-12 08:20:45 +01:00
|
|
|
"HOST": "",
|
|
|
|
"SCHEMA": "zulip",
|
|
|
|
"CONN_MAX_AGE": 600,
|
|
|
|
"OPTIONS": {
|
|
|
|
"connection_factory": TimeTrackingConnection,
|
2022-07-05 22:38:55 +02:00
|
|
|
"cursor_factory": TimeTrackingCursor,
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
if DEVELOPMENT:
|
|
|
|
LOCAL_DATABASE_PASSWORD = get_secret("local_database_password")
|
2020-09-03 05:32:15 +02:00
|
|
|
DATABASES["default"].update(
|
|
|
|
PASSWORD=LOCAL_DATABASE_PASSWORD,
|
2021-02-12 08:20:45 +01:00
|
|
|
HOST="localhost",
|
2020-09-03 05:32:15 +02:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
elif REMOTE_POSTGRES_HOST != "":
|
|
|
|
DATABASES["default"].update(
|
2020-09-03 05:32:15 +02:00
|
|
|
HOST=REMOTE_POSTGRES_HOST,
|
|
|
|
PORT=REMOTE_POSTGRES_PORT,
|
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
if get_secret("postgres_password") is not None:
|
2021-02-12 08:20:45 +01:00
|
|
|
DATABASES["default"].update(
|
2020-09-03 05:32:15 +02:00
|
|
|
PASSWORD=get_secret("postgres_password"),
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
if REMOTE_POSTGRES_SSLMODE != "":
|
|
|
|
DATABASES["default"]["OPTIONS"]["sslmode"] = REMOTE_POSTGRES_SSLMODE
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
DATABASES["default"]["OPTIONS"]["sslmode"] = "verify-full"
|
2022-04-11 20:03:40 +02:00
|
|
|
elif get_config("postgresql", "database_user", "zulip") != "zulip":
|
2021-05-25 05:46:09 +02:00
|
|
|
if get_secret("postgres_password") is not None:
|
|
|
|
DATABASES["default"].update(
|
|
|
|
PASSWORD=get_secret("postgres_password"),
|
|
|
|
HOST="localhost",
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
POSTGRESQL_MISSING_DICTIONARIES = bool(get_config("postgresql", "missing_dictionaries", None))
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-05-01 15:34:59 +02:00
|
|
|
DEFAULT_AUTO_FIELD = "django.db.models.AutoField"
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
########################################################################
|
|
|
|
# RABBITMQ CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
USING_RABBITMQ = True
|
|
|
|
RABBITMQ_PASSWORD = get_secret("rabbitmq_password")
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# CACHING CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
2022-03-09 02:41:27 +01:00
|
|
|
SESSION_ENGINE = "zerver.lib.safe_session_cached_db"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
MEMCACHED_PASSWORD = get_secret("memcached_password")
|
|
|
|
|
2022-06-20 21:20:29 +02:00
|
|
|
CACHES: Dict[str, Dict[str, object]] = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"default": {
|
2022-04-05 03:27:33 +02:00
|
|
|
"BACKEND": "zerver.lib.singleton_bmemcached.SingletonBMemcached",
|
2021-02-12 08:20:45 +01:00
|
|
|
"LOCATION": MEMCACHED_LOCATION,
|
|
|
|
"OPTIONS": {
|
|
|
|
"socket_timeout": 3600,
|
|
|
|
"username": MEMCACHED_USERNAME,
|
|
|
|
"password": MEMCACHED_PASSWORD,
|
|
|
|
"pickle_protocol": 4,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"database": {
|
|
|
|
"BACKEND": "django.core.cache.backends.db.DatabaseCache",
|
|
|
|
"LOCATION": "third_party_api_results",
|
2020-06-08 03:58:37 +02:00
|
|
|
# This cache shouldn't timeout; we're really just using the
|
|
|
|
# cache API to store the results of requests to third-party
|
|
|
|
# APIs like the Twitter API permanently.
|
2021-02-12 08:20:45 +01:00
|
|
|
"TIMEOUT": None,
|
|
|
|
"OPTIONS": {
|
|
|
|
"MAX_ENTRIES": 100000000,
|
|
|
|
"CULL_FREQUENCY": 10,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# REDIS-BASED RATE LIMITING CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
RATE_LIMITING_RULES = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"api_by_user": [
|
2020-06-08 03:58:37 +02:00
|
|
|
(60, 200), # 200 requests max every minute
|
|
|
|
],
|
2021-07-08 14:46:47 +02:00
|
|
|
"api_by_ip": [
|
|
|
|
(60, 100),
|
|
|
|
],
|
2021-07-08 14:46:47 +02:00
|
|
|
"api_by_remote_server": [
|
|
|
|
(60, 1000),
|
|
|
|
],
|
2021-02-12 08:20:45 +01:00
|
|
|
"authenticate_by_username": [
|
2022-04-11 22:52:59 +02:00
|
|
|
(1800, 5), # 5 failed login attempts within 30 minutes
|
2020-06-08 03:58:37 +02:00
|
|
|
],
|
2021-11-03 23:20:55 +01:00
|
|
|
"email_change_by_user": [
|
|
|
|
(3600, 2), # 2 per hour
|
|
|
|
(86400, 5), # 5 per day
|
|
|
|
],
|
2021-02-12 08:20:45 +01:00
|
|
|
"password_reset_form_by_email": [
|
2020-06-08 03:58:37 +02:00
|
|
|
(3600, 2), # 2 reset emails per hour
|
|
|
|
(86400, 5), # 5 per day
|
|
|
|
],
|
2021-11-03 21:40:28 +01:00
|
|
|
"sends_email_by_ip": [
|
2021-11-05 21:10:05 +01:00
|
|
|
(86400, 5),
|
2021-11-03 21:40:28 +01:00
|
|
|
],
|
2021-11-02 15:42:58 +01:00
|
|
|
"spectator_attachment_access_by_file": [
|
|
|
|
(86400, 1000), # 1000 per day per file
|
|
|
|
],
|
2020-06-08 03:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# List of domains that, when applied to a request in a Tornado process,
|
|
|
|
# will be handled with the separate in-memory rate limiting backend for Tornado,
|
|
|
|
# which has its own buckets separate from the default backend.
|
|
|
|
# In principle, it should be impossible to make requests to tornado that fall into
|
|
|
|
# other domains, but we use this list as an extra precaution.
|
2021-07-08 14:46:47 +02:00
|
|
|
RATE_LIMITING_DOMAINS_FOR_TORNADO = ["api_by_user", "api_by_ip"]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-02-27 08:19:13 +01:00
|
|
|
# These ratelimits are also documented publicly at
|
|
|
|
# https://zulip.readthedocs.io/en/latest/production/email-gateway.html
|
2020-06-08 03:58:37 +02:00
|
|
|
RATE_LIMITING_MIRROR_REALM_RULES = [
|
|
|
|
(60, 50), # 50 emails per minute
|
|
|
|
(300, 120), # 120 emails per 5 minutes
|
|
|
|
(3600, 600), # 600 emails per hour
|
|
|
|
]
|
|
|
|
|
|
|
|
DEBUG_RATE_LIMITING = DEBUG
|
2021-02-12 08:20:45 +01:00
|
|
|
REDIS_PASSWORD = get_secret("redis_password")
|
2020-06-08 03:58:37 +02:00
|
|
|
|
rate_limit: Add a flag to lump all TOR exit node IPs together.
TOR users are legitimate users of the system; however, that system can
also be used for abuse -- specifically, by evading IP-based
rate-limiting.
For the purposes of IP-based rate-limiting, add a
RATE_LIMIT_TOR_TOGETHER flag, defaulting to false, which lumps all
requests from TOR exit nodes into the same bucket. This may allow a
TOR user to deny other TOR users access to the find-my-account and
new-realm endpoints, but this is a low cost for cutting off a
significant potential abuse vector.
If enabled, the list of TOR exit nodes is fetched from their public
endpoint once per hour, via a cron job, and cached on disk. Django
processes load this data from disk, and cache it in memcached.
Requests are spared from the burden of checking disk on failure via a
circuitbreaker, which trips of there are two failures in a row, and
only begins trying again after 10 minutes.
2021-11-03 21:43:02 +01:00
|
|
|
# See RATE_LIMIT_TOR_TOGETHER
|
|
|
|
if DEVELOPMENT:
|
|
|
|
TOR_EXIT_NODE_FILE_PATH = os.path.join(DEPLOY_ROOT, "var/tor-exit-nodes.json")
|
|
|
|
else:
|
|
|
|
TOR_EXIT_NODE_FILE_PATH = "/var/lib/zulip/tor-exit-nodes.json"
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
########################################################################
|
|
|
|
# SECURITY SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Tell the browser to never send our cookies without encryption, e.g.
|
|
|
|
# when executing the initial http -> https redirect.
|
|
|
|
#
|
|
|
|
# Turn it off for local testing because we don't have SSL.
|
|
|
|
if PRODUCTION:
|
|
|
|
SESSION_COOKIE_SECURE = True
|
|
|
|
CSRF_COOKIE_SECURE = True
|
|
|
|
|
|
|
|
# https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-05#section-4.1.3.2
|
|
|
|
SESSION_COOKIE_NAME = "__Host-sessionid"
|
|
|
|
CSRF_COOKIE_NAME = "__Host-csrftoken"
|
|
|
|
|
2020-10-23 02:43:28 +02:00
|
|
|
# Prevent JavaScript from reading the CSRF token from cookies. Our code gets
|
2020-06-08 03:58:37 +02:00
|
|
|
# the token from the DOM, which means malicious code could too. But hiding the
|
|
|
|
# cookie will slow down some attackers.
|
|
|
|
CSRF_COOKIE_HTTPONLY = True
|
2021-02-12 08:20:45 +01:00
|
|
|
CSRF_FAILURE_VIEW = "zerver.middleware.csrf_failure"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
if DEVELOPMENT:
|
|
|
|
# Use fast password hashing for creating testing users when not
|
|
|
|
# PRODUCTION. Saves a bunch of time.
|
|
|
|
PASSWORD_HASHERS = (
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.contrib.auth.hashers.SHA1PasswordHasher",
|
|
|
|
"django.contrib.auth.hashers.PBKDF2PasswordHasher",
|
2020-06-08 03:58:37 +02:00
|
|
|
)
|
|
|
|
# Also we auto-generate passwords for the default users which you
|
|
|
|
# can query using ./manage.py print_initial_password
|
|
|
|
INITIAL_PASSWORD_SALT = get_secret("initial_password_salt")
|
|
|
|
else:
|
|
|
|
# For production, use the best password hashing algorithm: Argon2
|
|
|
|
# Zulip was originally on PBKDF2 so we need it for compatibility
|
2021-02-12 08:19:30 +01:00
|
|
|
PASSWORD_HASHERS = (
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.contrib.auth.hashers.Argon2PasswordHasher",
|
|
|
|
"django.contrib.auth.hashers.PBKDF2PasswordHasher",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# API/BOT SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
ROOT_DOMAIN_URI = EXTERNAL_URI_SCHEME + EXTERNAL_HOST
|
|
|
|
|
|
|
|
S3_KEY = get_secret("s3_key")
|
|
|
|
S3_SECRET_KEY = get_secret("s3_secret_key")
|
|
|
|
|
|
|
|
if LOCAL_UPLOADS_DIR is not None:
|
|
|
|
if SENDFILE_BACKEND is None:
|
2021-02-12 08:20:45 +01:00
|
|
|
SENDFILE_BACKEND = "django_sendfile.backends.nginx"
|
2020-06-08 03:58:37 +02:00
|
|
|
SENDFILE_ROOT = os.path.join(LOCAL_UPLOADS_DIR, "files")
|
2021-02-12 08:20:45 +01:00
|
|
|
SENDFILE_URL = "/serve_uploads"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# GCM tokens are IP-whitelisted; if we deploy to additional
|
|
|
|
# servers you will need to explicitly add their IPs here:
|
|
|
|
# https://cloud.google.com/console/project/apps~zulip-android/apiui/credential
|
|
|
|
ANDROID_GCM_API_KEY = get_secret("android_gcm_api_key")
|
|
|
|
|
|
|
|
DROPBOX_APP_KEY = get_secret("dropbox_app_key")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
BIG_BLUE_BUTTON_SECRET = get_secret("big_blue_button_secret")
|
2020-04-27 22:41:31 +02:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
# Twitter API credentials
|
|
|
|
# Secrecy not required because its only used for R/O requests.
|
|
|
|
# Please don't make us go over our rate limit.
|
|
|
|
TWITTER_CONSUMER_KEY = get_secret("twitter_consumer_key")
|
|
|
|
TWITTER_CONSUMER_SECRET = get_secret("twitter_consumer_secret")
|
|
|
|
TWITTER_ACCESS_TOKEN_KEY = get_secret("twitter_access_token_key")
|
|
|
|
TWITTER_ACCESS_TOKEN_SECRET = get_secret("twitter_access_token_secret")
|
|
|
|
|
|
|
|
# These are the bots that Zulip sends automated messages as.
|
2021-02-12 08:19:30 +01:00
|
|
|
INTERNAL_BOTS = [
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "NOTIFICATION_BOT",
|
|
|
|
"email_template": "notification-bot@%s",
|
|
|
|
"name": "Notification Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "EMAIL_GATEWAY_BOT",
|
|
|
|
"email_template": "emailgateway@%s",
|
|
|
|
"name": "Email Gateway",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "NAGIOS_SEND_BOT",
|
|
|
|
"email_template": "nagios-send-bot@%s",
|
|
|
|
"name": "Nagios Send Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "NAGIOS_RECEIVE_BOT",
|
|
|
|
"email_template": "nagios-receive-bot@%s",
|
|
|
|
"name": "Nagios Receive Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "WELCOME_BOT",
|
|
|
|
"email_template": "welcome-bot@%s",
|
|
|
|
"name": "Welcome Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Bots that are created for each realm like the reminder-bot goes here.
|
|
|
|
REALM_INTERNAL_BOTS: List[Dict[str, str]] = []
|
|
|
|
# These are realm-internal bots that may exist in some organizations,
|
|
|
|
# so configure power the setting, but should not be auto-created at this time.
|
|
|
|
DISABLED_REALM_INTERNAL_BOTS = [
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "REMINDER_BOT",
|
|
|
|
"email_template": "reminder-bot@%s",
|
|
|
|
"name": "Reminder Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
if PRODUCTION:
|
|
|
|
INTERNAL_BOTS += [
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "NAGIOS_STAGING_SEND_BOT",
|
|
|
|
"email_template": "nagios-staging-send-bot@%s",
|
|
|
|
"name": "Nagios Staging Send Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"var_name": "NAGIOS_STAGING_RECEIVE_BOT",
|
|
|
|
"email_template": "nagios-staging-receive-bot@%s",
|
|
|
|
"name": "Nagios Staging Receive Bot",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
INTERNAL_BOT_DOMAIN = "zulip.com"
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# STATSD CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Statsd is not super well supported; if you want to use it you'll need
|
|
|
|
# to set STATSD_HOST and STATSD_PREFIX.
|
2021-02-12 08:20:45 +01:00
|
|
|
if STATSD_HOST != "":
|
|
|
|
INSTALLED_APPS += ["django_statsd"]
|
2020-06-08 03:58:37 +02:00
|
|
|
STATSD_PORT = 8125
|
2021-02-12 08:20:45 +01:00
|
|
|
STATSD_CLIENT = "django_statsd.clients.normal"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# CAMO HTTPS CACHE CONFIGURATION
|
|
|
|
########################################################################
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
if CAMO_URI != "":
|
2020-06-08 03:58:37 +02:00
|
|
|
# This needs to be synced with the Camo installation
|
|
|
|
CAMO_KEY = get_secret("camo_key")
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# STATIC CONTENT AND MINIFICATION SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
if PRODUCTION or IS_DEV_DROPLET or os.getenv("EXTERNAL_HOST") is not None:
|
|
|
|
STATIC_URL = urljoin(ROOT_DOMAIN_URI, "/static/")
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
STATIC_URL = "http://localhost:9991/static/"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# ZulipStorage is a modified version of ManifestStaticFilesStorage,
|
|
|
|
# and, like that class, it inserts a file hash into filenames
|
|
|
|
# to prevent the browser from using stale files from cache.
|
|
|
|
#
|
|
|
|
# Unlike PipelineStorage, it requires the files to exist in
|
|
|
|
# STATIC_ROOT even for dev servers. So we only use
|
|
|
|
# ZulipStorage when not DEBUG.
|
|
|
|
|
|
|
|
if not DEBUG:
|
2021-02-12 08:20:45 +01:00
|
|
|
STATICFILES_STORAGE = "zerver.lib.storage.ZulipStorage"
|
2020-06-08 03:58:37 +02:00
|
|
|
if PRODUCTION:
|
2021-02-12 08:20:45 +01:00
|
|
|
STATIC_ROOT = "/home/zulip/prod-static"
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
STATIC_ROOT = os.path.abspath(os.path.join(DEPLOY_ROOT, "prod-static/serve"))
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# If changing this, you need to also the hack modifications to this in
|
|
|
|
# our compilemessages management command.
|
2021-02-12 08:20:45 +01:00
|
|
|
LOCALE_PATHS = (os.path.join(DEPLOY_ROOT, "locale"),)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# We want all temporary uploaded files to be stored on disk.
|
|
|
|
FILE_UPLOAD_MAX_MEMORY_SIZE = 0
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
STATICFILES_DIRS = ["static/"]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
if DEBUG:
|
2021-03-17 03:11:19 +01:00
|
|
|
WEBPACK_BUNDLES = "../webpack/"
|
|
|
|
WEBPACK_STATS_FILE = os.path.join(DEPLOY_ROOT, "var", "webpack-stats-dev.json")
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-03-17 03:11:19 +01:00
|
|
|
WEBPACK_BUNDLES = "webpack-bundles/"
|
|
|
|
WEBPACK_STATS_FILE = os.path.join(DEPLOY_ROOT, "webpack-stats-production.json")
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# TEMPLATES SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# List of callables that know how to import templates from various sources.
|
|
|
|
LOADERS: List[Union[str, Tuple[object, ...]]] = [
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.template.loaders.filesystem.Loader",
|
|
|
|
"django.template.loaders.app_directories.Loader",
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
if PRODUCTION:
|
|
|
|
# Template caching is a significant performance win in production.
|
2021-02-12 08:20:45 +01:00
|
|
|
LOADERS = [("django.template.loaders.cached.Loader", LOADERS)]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
base_template_engine_settings: Dict[str, Any] = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"BACKEND": "django.template.backends.jinja2.Jinja2",
|
|
|
|
"OPTIONS": {
|
|
|
|
"environment": "zproject.jinja2.environment",
|
|
|
|
"extensions": [
|
|
|
|
"jinja2.ext.i18n",
|
2020-06-08 03:58:37 +02:00
|
|
|
],
|
2021-02-12 08:20:45 +01:00
|
|
|
"context_processors": [
|
|
|
|
"zerver.context_processors.zulip_default_context",
|
|
|
|
"django.template.context_processors.i18n",
|
2020-06-08 03:58:37 +02:00
|
|
|
],
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
default_template_engine_settings = deepcopy(base_template_engine_settings)
|
2020-09-03 05:32:15 +02:00
|
|
|
default_template_engine_settings.update(
|
2021-02-12 08:20:45 +01:00
|
|
|
NAME="Jinja2",
|
2020-09-03 05:32:15 +02:00
|
|
|
DIRS=[
|
2020-06-08 03:58:37 +02:00
|
|
|
# The main templates directory
|
2021-02-12 08:20:45 +01:00
|
|
|
os.path.join(DEPLOY_ROOT, "templates"),
|
2020-06-08 03:58:37 +02:00
|
|
|
# The webhook integration templates
|
2021-02-12 08:20:45 +01:00
|
|
|
os.path.join(DEPLOY_ROOT, "zerver", "webhooks"),
|
2020-06-08 03:58:37 +02:00
|
|
|
# The python-zulip-api:zulip_bots package templates
|
2021-02-12 08:20:45 +01:00
|
|
|
os.path.join("static" if DEBUG else STATIC_ROOT, "generated", "bots"),
|
2020-06-08 03:58:37 +02:00
|
|
|
],
|
2020-09-03 05:32:15 +02:00
|
|
|
APP_DIRS=True,
|
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
non_html_template_engine_settings = deepcopy(base_template_engine_settings)
|
2020-09-03 05:32:15 +02:00
|
|
|
non_html_template_engine_settings.update(
|
2021-02-12 08:20:45 +01:00
|
|
|
NAME="Jinja2_plaintext",
|
|
|
|
DIRS=[os.path.join(DEPLOY_ROOT, "templates")],
|
2020-09-03 05:32:15 +02:00
|
|
|
APP_DIRS=False,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
non_html_template_engine_settings["OPTIONS"].update(
|
2020-09-03 05:32:15 +02:00
|
|
|
autoescape=False,
|
|
|
|
trim_blocks=True,
|
|
|
|
lstrip_blocks=True,
|
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# django-two-factor uses the default Django template engine (not Jinja2), so we
|
|
|
|
# need to add config for it here.
|
2021-02-12 08:20:45 +01:00
|
|
|
two_factor_template_options = deepcopy(default_template_engine_settings["OPTIONS"])
|
|
|
|
del two_factor_template_options["environment"]
|
|
|
|
del two_factor_template_options["extensions"]
|
|
|
|
two_factor_template_options["loaders"] = ["zproject.settings.TwoFactorLoader"]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
two_factor_template_engine_settings = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"NAME": "Two_Factor",
|
|
|
|
"BACKEND": "django.template.backends.django.DjangoTemplates",
|
|
|
|
"DIRS": [],
|
|
|
|
"APP_DIRS": False,
|
|
|
|
"OPTIONS": two_factor_template_options,
|
2020-06-08 03:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# The order here is important; get_template and related/parent functions try
|
|
|
|
# the template engines in order until one succeeds.
|
|
|
|
TEMPLATES = [
|
|
|
|
default_template_engine_settings,
|
|
|
|
non_html_template_engine_settings,
|
|
|
|
two_factor_template_engine_settings,
|
|
|
|
]
|
|
|
|
########################################################################
|
|
|
|
# LOGGING SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
def zulip_path(path: str) -> str:
|
|
|
|
if DEVELOPMENT:
|
|
|
|
# if DEVELOPMENT, store these files in the Zulip checkout
|
|
|
|
if path.startswith("/var/log"):
|
|
|
|
path = os.path.join(DEVELOPMENT_LOG_DIRECTORY, os.path.basename(path))
|
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
path = os.path.join(os.path.join(DEPLOY_ROOT, "var"), os.path.basename(path))
|
2020-06-08 03:58:37 +02:00
|
|
|
return path
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
SERVER_LOG_PATH = zulip_path("/var/log/zulip/server.log")
|
|
|
|
ERROR_FILE_LOG_PATH = zulip_path("/var/log/zulip/errors.log")
|
|
|
|
MANAGEMENT_LOG_PATH = zulip_path("/var/log/zulip/manage.log")
|
|
|
|
WORKER_LOG_PATH = zulip_path("/var/log/zulip/workers.log")
|
|
|
|
SLOW_QUERIES_LOG_PATH = zulip_path("/var/log/zulip/slow_queries.log")
|
|
|
|
JSON_PERSISTENT_QUEUE_FILENAME_PATTERN = zulip_path("/home/zulip/tornado/event_queues%s.json")
|
|
|
|
EMAIL_LOG_PATH = zulip_path("/var/log/zulip/send_email.log")
|
|
|
|
EMAIL_MIRROR_LOG_PATH = zulip_path("/var/log/zulip/email_mirror.log")
|
2020-10-24 02:28:13 +02:00
|
|
|
EMAIL_DELIVERER_LOG_PATH = zulip_path("/var/log/zulip/email_deliverer.log")
|
2020-06-08 03:58:37 +02:00
|
|
|
EMAIL_CONTENT_LOG_PATH = zulip_path("/var/log/zulip/email_content.log")
|
|
|
|
LDAP_LOG_PATH = zulip_path("/var/log/zulip/ldap.log")
|
|
|
|
LDAP_SYNC_LOG_PATH = zulip_path("/var/log/zulip/sync_ldap_user_data.log")
|
|
|
|
QUEUE_ERROR_DIR = zulip_path("/var/log/zulip/queue_error")
|
|
|
|
QUEUE_STATS_DIR = zulip_path("/var/log/zulip/queue_stats")
|
|
|
|
DIGEST_LOG_PATH = zulip_path("/var/log/zulip/digest.log")
|
|
|
|
ANALYTICS_LOG_PATH = zulip_path("/var/log/zulip/analytics.log")
|
|
|
|
ANALYTICS_LOCK_DIR = zulip_path("/home/zulip/deployments/analytics-lock-dir")
|
2020-08-20 00:34:12 +02:00
|
|
|
WEBHOOK_LOG_PATH = zulip_path("/var/log/zulip/webhooks_errors.log")
|
2021-09-13 20:23:54 +02:00
|
|
|
WEBHOOK_ANOMALOUS_PAYLOADS_LOG_PATH = zulip_path("/var/log/zulip/webhooks_anomalous_payloads.log")
|
2020-08-19 22:26:38 +02:00
|
|
|
WEBHOOK_UNSUPPORTED_EVENTS_LOG_PATH = zulip_path("/var/log/zulip/webhooks_unsupported_events.log")
|
2020-06-08 03:58:37 +02:00
|
|
|
SOFT_DEACTIVATION_LOG_PATH = zulip_path("/var/log/zulip/soft_deactivation.log")
|
|
|
|
TRACEMALLOC_DUMP_DIR = zulip_path("/var/log/zulip/tracemalloc")
|
2021-05-18 01:22:05 +02:00
|
|
|
DELIVER_SCHEDULED_MESSAGES_LOG_PATH = zulip_path("/var/log/zulip/deliver_scheduled_messages.log")
|
2020-06-08 03:58:37 +02:00
|
|
|
RETENTION_LOG_PATH = zulip_path("/var/log/zulip/message_retention.log")
|
|
|
|
AUTH_LOG_PATH = zulip_path("/var/log/zulip/auth.log")
|
2021-09-10 18:36:56 +02:00
|
|
|
SCIM_LOG_PATH = zulip_path("/var/log/zulip/scim.log")
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
ZULIP_WORKER_TEST_FILE = "/tmp/zulip-worker-test-file"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
|
|
|
|
if IS_WORKER:
|
|
|
|
FILE_LOG_PATH = WORKER_LOG_PATH
|
|
|
|
else:
|
|
|
|
FILE_LOG_PATH = SERVER_LOG_PATH
|
|
|
|
|
|
|
|
# This is disabled in a few tests.
|
|
|
|
LOGGING_ENABLED = True
|
|
|
|
|
2020-09-02 06:59:07 +02:00
|
|
|
DEFAULT_ZULIP_HANDLERS = [
|
2021-02-12 08:20:45 +01:00
|
|
|
*(["zulip_admins"] if ERROR_REPORTING else []),
|
|
|
|
"console",
|
|
|
|
"file",
|
|
|
|
"errors_file",
|
2020-09-02 06:59:07 +02:00
|
|
|
]
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
LOGGING: Dict[str, Any] = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"version": 1,
|
|
|
|
"disable_existing_loggers": False,
|
|
|
|
"formatters": {
|
|
|
|
"default": {
|
|
|
|
"()": "zerver.lib.logging_util.ZulipFormatter",
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"webhook_request_data": {
|
|
|
|
"()": "zerver.lib.logging_util.ZulipWebhookFormatter",
|
2020-09-04 03:38:24 +02:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"filters": {
|
|
|
|
"ZulipLimiter": {
|
|
|
|
"()": "zerver.lib.logging_util.ZulipLimiter",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"EmailLimiter": {
|
|
|
|
"()": "zerver.lib.logging_util.EmailLimiter",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"require_debug_false": {
|
|
|
|
"()": "django.utils.log.RequireDebugFalse",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"require_debug_true": {
|
|
|
|
"()": "django.utils.log.RequireDebugTrue",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"nop": {
|
|
|
|
"()": "zerver.lib.logging_util.ReturnTrue",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"require_logging_enabled": {
|
|
|
|
"()": "zerver.lib.logging_util.ReturnEnabled",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"require_really_deployed": {
|
|
|
|
"()": "zerver.lib.logging_util.RequireReallyDeployed",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"skip_200_and_304": {
|
|
|
|
"()": "django.utils.log.CallbackFilter",
|
|
|
|
"callback": zerver.lib.logging_util.skip_200_and_304,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"skip_site_packages_logs": {
|
|
|
|
"()": "django.utils.log.CallbackFilter",
|
|
|
|
"callback": zerver.lib.logging_util.skip_site_packages_logs,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"handlers": {
|
|
|
|
"zulip_admins": {
|
|
|
|
"level": "ERROR",
|
|
|
|
"class": "zerver.logging_handlers.AdminNotifyHandler",
|
|
|
|
"filters": (
|
|
|
|
["ZulipLimiter", "require_debug_false", "require_really_deployed"]
|
2021-02-12 08:19:30 +01:00
|
|
|
if not DEBUG_ERROR_REPORTING
|
|
|
|
else []
|
|
|
|
),
|
2021-02-12 08:20:45 +01:00
|
|
|
"formatter": "default",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"auth_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": AUTH_LOG_PATH,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"console": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.StreamHandler",
|
|
|
|
"formatter": "default",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": FILE_LOG_PATH,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"errors_file": {
|
|
|
|
"level": "WARNING",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": ERROR_FILE_LOG_PATH,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"ldap_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": LDAP_LOG_PATH,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-09-10 18:36:56 +02:00
|
|
|
"scim_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": SCIM_LOG_PATH,
|
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"slow_queries_file": {
|
|
|
|
"level": "INFO",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "default",
|
|
|
|
"filename": SLOW_QUERIES_LOG_PATH,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"webhook_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "webhook_request_data",
|
|
|
|
"filename": WEBHOOK_LOG_PATH,
|
2020-09-02 03:15:08 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"webhook_unsupported_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "webhook_request_data",
|
|
|
|
"filename": WEBHOOK_UNSUPPORTED_EVENTS_LOG_PATH,
|
2020-09-02 03:15:08 +02:00
|
|
|
},
|
2021-09-13 20:23:54 +02:00
|
|
|
"webhook_anomalous_file": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"class": "logging.handlers.WatchedFileHandler",
|
|
|
|
"formatter": "webhook_request_data",
|
|
|
|
"filename": WEBHOOK_ANOMALOUS_PAYLOADS_LOG_PATH,
|
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"loggers": {
|
2020-06-08 03:58:37 +02:00
|
|
|
# The Python logging module uses a hierarchy of logger names for config:
|
|
|
|
# "foo.bar" has parent "foo" has parent "", the root. But the semantics
|
|
|
|
# are subtle: it walks this hierarchy once to find the log level to
|
|
|
|
# decide whether to log the record at all, then a separate time to find
|
|
|
|
# handlers to emit the record.
|
|
|
|
#
|
|
|
|
# For `level`, the most specific ancestor that has a `level` counts.
|
|
|
|
# For `handlers`, the most specific ancestor that has a `handlers`
|
|
|
|
# counts (assuming we set `propagate=False`, which we always do.)
|
|
|
|
# These are independent -- they might come at the same layer, or
|
|
|
|
# either one could come before the other.
|
|
|
|
#
|
|
|
|
# For `filters`, no ancestors count at all -- only the exact logger name
|
|
|
|
# the record was logged at.
|
|
|
|
#
|
|
|
|
# Upstream docs: https://docs.python.org/3/library/logging
|
|
|
|
#
|
|
|
|
# Style rules:
|
|
|
|
# * Always set `propagate=False` if setting `handlers`.
|
|
|
|
# * Setting `level` equal to the parent is redundant; don't.
|
|
|
|
# * Setting `handlers` equal to the parent is redundant; don't.
|
|
|
|
# * Always write in order: level, filters, handlers, propagate.
|
|
|
|
# root logger
|
2021-02-12 08:20:45 +01:00
|
|
|
"": {
|
|
|
|
"level": "INFO",
|
|
|
|
"filters": ["require_logging_enabled"],
|
|
|
|
"handlers": DEFAULT_ZULIP_HANDLERS,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
|
|
|
# Django, alphabetized
|
2021-02-12 08:20:45 +01:00
|
|
|
"django": {
|
2020-06-08 03:58:37 +02:00
|
|
|
# Django's default logging config has already set some
|
|
|
|
# things on this logger. Just mentioning it here causes
|
|
|
|
# `logging.config` to reset it to defaults, as if never
|
|
|
|
# configured; which is what we want for it.
|
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.request": {
|
2020-06-08 03:58:37 +02:00
|
|
|
# We set this to ERROR to prevent Django's default
|
|
|
|
# low-value logs with lines like "Not Found: /robots.txt"
|
|
|
|
# from being logged for every HTTP 4xx error at WARNING
|
|
|
|
# level, which would otherwise end up spamming our
|
|
|
|
# errors.log. We'll still get logs in errors.log
|
|
|
|
# including tracebacks for 5xx errors (i.e. Python
|
|
|
|
# exceptions).
|
2021-02-12 08:20:45 +01:00
|
|
|
"level": "ERROR",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.security.DisallowedHost": {
|
|
|
|
"handlers": ["file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.server": {
|
|
|
|
"filters": ["skip_200_and_304"],
|
|
|
|
"handlers": ["console", "file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.utils.autoreload": {
|
2020-06-08 03:58:37 +02:00
|
|
|
# We don't want logging spam from the autoreloaders in development.
|
2021-02-12 08:20:45 +01:00
|
|
|
"level": "WARNING",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"django.template": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"filters": ["require_debug_true", "skip_site_packages_logs"],
|
|
|
|
"handlers": ["console"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
|
|
|
## Uncomment the following to get all database queries logged to the console
|
|
|
|
# 'django.db': {
|
|
|
|
# 'level': 'DEBUG',
|
|
|
|
# 'handlers': ['console'],
|
|
|
|
# 'propagate': False,
|
|
|
|
# },
|
|
|
|
# other libraries, alphabetized
|
2021-02-12 08:20:45 +01:00
|
|
|
"django_auth_ldap": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["console", "ldap_file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-09-10 18:36:56 +02:00
|
|
|
"django_scim": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["scim_file", "errors_file"],
|
|
|
|
"propagate": False,
|
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"pika": {
|
2020-06-08 03:58:37 +02:00
|
|
|
# pika is super chatty on INFO.
|
2021-02-12 08:20:45 +01:00
|
|
|
"level": "WARNING",
|
2020-06-08 03:58:37 +02:00
|
|
|
# pika spews a lot of ERROR logs when a connection fails.
|
|
|
|
# We reconnect automatically, so those should be treated as WARNING --
|
|
|
|
# write to the log for use in debugging, but no error emails/Zulips.
|
2021-02-12 08:20:45 +01:00
|
|
|
"handlers": ["console", "file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"requests": {
|
|
|
|
"level": "WARNING",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
|
|
|
# our own loggers, alphabetized
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.lib.digest": {
|
|
|
|
"level": "DEBUG",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-05-11 03:32:31 +02:00
|
|
|
"zerver.management.commands.deliver_scheduled_emails": {
|
2021-02-12 08:20:45 +01:00
|
|
|
"level": "DEBUG",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.management.commands.enqueue_digest_emails": {
|
|
|
|
"level": "DEBUG",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.management.commands.deliver_scheduled_messages": {
|
|
|
|
"level": "DEBUG",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.auth": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": [*DEFAULT_ZULIP_HANDLERS, "auth_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.ldap": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["console", "ldap_file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.management": {
|
|
|
|
"handlers": ["file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.queue": {
|
|
|
|
"level": "WARNING",
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.retention": {
|
|
|
|
"handlers": ["file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.slow_queries": {
|
|
|
|
"level": "INFO",
|
|
|
|
"handlers": ["slow_queries_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.soft_deactivation": {
|
|
|
|
"handlers": ["file", "errors_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2020-07-28 01:29:34 +02:00
|
|
|
# This logger is used only for automated tests validating the
|
|
|
|
# error-handling behavior of the zulip_admins handler.
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.test_zulip_admins_handler": {
|
|
|
|
"handlers": ["zulip_admins"],
|
|
|
|
"propagate": False,
|
2020-07-28 01:29:34 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.zerver.webhooks": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["file", "errors_file", "webhook_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-02-12 08:20:45 +01:00
|
|
|
"zulip.zerver.webhooks.unsupported": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["webhook_unsupported_file"],
|
|
|
|
"propagate": False,
|
2020-06-08 03:58:37 +02:00
|
|
|
},
|
2021-09-13 20:23:54 +02:00
|
|
|
"zulip.zerver.webhooks.anomalous": {
|
|
|
|
"level": "DEBUG",
|
|
|
|
"handlers": ["webhook_anomalous_file"],
|
|
|
|
"propagate": False,
|
|
|
|
},
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2020-06-08 03:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if DEVELOPMENT:
|
2021-02-12 08:20:45 +01:00
|
|
|
CONTRIBUTOR_DATA_FILE_PATH = os.path.join(DEPLOY_ROOT, "var/github-contributors.json")
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
CONTRIBUTOR_DATA_FILE_PATH = "/var/lib/zulip/github-contributors.json"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
LOGIN_REDIRECT_URL = "/"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-06-04 15:12:37 +02:00
|
|
|
# Client-side polling timeout for get_events, in seconds.
|
2020-06-08 03:58:37 +02:00
|
|
|
# We configure this here so that the client test suite can override it.
|
|
|
|
# We already kill the connection server-side with heartbeat events,
|
|
|
|
# but it's good to have a safety. This value should be greater than
|
|
|
|
# (HEARTBEAT_MIN_FREQ_SECS + 10)
|
2021-06-04 15:12:37 +02:00
|
|
|
EVENT_QUEUE_LONGPOLL_TIMEOUT_SECONDS = 90
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# SSO AND LDAP SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
2020-09-03 06:54:56 +02:00
|
|
|
USING_LDAP = "zproject.backends.ZulipLDAPAuthBackend" in AUTHENTICATION_BACKENDS
|
|
|
|
ONLY_LDAP = AUTHENTICATION_BACKENDS == ("zproject.backends.ZulipLDAPAuthBackend",)
|
2021-02-12 08:20:45 +01:00
|
|
|
USING_APACHE_SSO = "zproject.backends.ZulipRemoteUserBackend" in AUTHENTICATION_BACKENDS
|
2020-09-03 06:54:56 +02:00
|
|
|
ONLY_SSO = AUTHENTICATION_BACKENDS == ("zproject.backends.ZulipRemoteUserBackend",)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2022-05-09 04:53:19 +02:00
|
|
|
if HOME_NOT_LOGGED_IN is None:
|
|
|
|
if ONLY_SSO:
|
|
|
|
HOME_NOT_LOGGED_IN = "/accounts/login/sso/"
|
|
|
|
else:
|
|
|
|
HOME_NOT_LOGGED_IN = "/login/"
|
2020-09-03 06:54:56 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
AUTHENTICATION_BACKENDS += ("zproject.backends.ZulipDummyBackend",)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
POPULATE_PROFILE_VIA_LDAP = bool(AUTH_LDAP_SERVER_URI)
|
|
|
|
|
2020-09-03 06:54:56 +02:00
|
|
|
if POPULATE_PROFILE_VIA_LDAP and not USING_LDAP:
|
2021-02-12 08:20:45 +01:00
|
|
|
AUTHENTICATION_BACKENDS += ("zproject.backends.ZulipLDAPUserPopulator",)
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2020-09-03 06:54:56 +02:00
|
|
|
POPULATE_PROFILE_VIA_LDAP = USING_LDAP or POPULATE_PROFILE_VIA_LDAP
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
if POPULATE_PROFILE_VIA_LDAP:
|
|
|
|
import ldap
|
2021-02-12 08:19:30 +01:00
|
|
|
|
|
|
|
if AUTH_LDAP_BIND_DN and ldap.OPT_REFERRALS not in AUTH_LDAP_CONNECTION_OPTIONS:
|
2020-06-08 03:58:37 +02:00
|
|
|
# The default behavior of python-ldap (without setting option
|
|
|
|
# `ldap.OPT_REFERRALS`) is to follow referrals, but anonymously.
|
|
|
|
# If our original query was non-anonymous, that's unlikely to
|
|
|
|
# work; skip the referral.
|
|
|
|
#
|
|
|
|
# The common case of this is that the server is Active Directory,
|
|
|
|
# it's already given us the answer we need, and the referral is
|
|
|
|
# just speculation about someplace else that has data our query
|
|
|
|
# could in principle match.
|
|
|
|
AUTH_LDAP_CONNECTION_OPTIONS[ldap.OPT_REFERRALS] = 0
|
|
|
|
|
|
|
|
if REGISTER_LINK_DISABLED is None:
|
|
|
|
# The default for REGISTER_LINK_DISABLED is a bit more
|
|
|
|
# complicated: we want it to be disabled by default for people
|
|
|
|
# using the LDAP backend that auto-creates users on login.
|
2020-09-03 06:54:56 +02:00
|
|
|
REGISTER_LINK_DISABLED = ONLY_LDAP
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# SOCIAL AUTHENTICATION SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
SOCIAL_AUTH_FIELDS_STORED_IN_SESSION = [
|
2021-02-12 08:20:45 +01:00
|
|
|
"subdomain",
|
|
|
|
"is_signup",
|
|
|
|
"mobile_flow_otp",
|
|
|
|
"desktop_flow_otp",
|
|
|
|
"multiuse_object_key",
|
2021-02-12 08:19:30 +01:00
|
|
|
]
|
2021-02-12 08:20:45 +01:00
|
|
|
SOCIAL_AUTH_LOGIN_ERROR_URL = "/login/"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2021-08-23 15:14:05 +02:00
|
|
|
if SOCIAL_AUTH_SUBDOMAIN in ROOT_SUBDOMAIN_ALIASES:
|
|
|
|
ROOT_SUBDOMAIN_ALIASES.remove(SOCIAL_AUTH_SUBDOMAIN)
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
# CLIENT is required by PSA's internal implementation. We name it
|
|
|
|
# SERVICES_ID to make things more readable in the configuration
|
|
|
|
# and our own custom backend code.
|
|
|
|
SOCIAL_AUTH_APPLE_CLIENT = SOCIAL_AUTH_APPLE_SERVICES_ID
|
2021-02-12 08:19:30 +01:00
|
|
|
SOCIAL_AUTH_APPLE_AUDIENCE = [
|
|
|
|
id for id in [SOCIAL_AUTH_APPLE_CLIENT, SOCIAL_AUTH_APPLE_APP_ID] if id is not None
|
|
|
|
]
|
2020-06-24 15:28:47 +02:00
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
if PRODUCTION:
|
2020-06-25 13:26:17 +02:00
|
|
|
SOCIAL_AUTH_APPLE_SECRET = get_from_file_if_exists("/etc/zulip/apple-auth-key.p8")
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
|
|
|
SOCIAL_AUTH_APPLE_SECRET = get_from_file_if_exists("zproject/dev_apple.key")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
SOCIAL_AUTH_GITHUB_SECRET = get_secret("social_auth_github_secret")
|
|
|
|
SOCIAL_AUTH_GITLAB_SECRET = get_secret("social_auth_gitlab_secret")
|
|
|
|
SOCIAL_AUTH_GITHUB_SCOPE = ["user:email"]
|
2020-06-08 03:58:37 +02:00
|
|
|
if SOCIAL_AUTH_GITHUB_ORG_NAME or SOCIAL_AUTH_GITHUB_TEAM_ID:
|
|
|
|
SOCIAL_AUTH_GITHUB_SCOPE.append("read:org")
|
|
|
|
SOCIAL_AUTH_GITHUB_ORG_KEY = SOCIAL_AUTH_GITHUB_KEY
|
|
|
|
SOCIAL_AUTH_GITHUB_ORG_SECRET = SOCIAL_AUTH_GITHUB_SECRET
|
|
|
|
SOCIAL_AUTH_GITHUB_TEAM_KEY = SOCIAL_AUTH_GITHUB_KEY
|
|
|
|
SOCIAL_AUTH_GITHUB_TEAM_SECRET = SOCIAL_AUTH_GITHUB_SECRET
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
SOCIAL_AUTH_GOOGLE_SECRET = get_secret("social_auth_google_secret")
|
2020-06-08 03:58:37 +02:00
|
|
|
# Fallback to google-oauth settings in case social auth settings for
|
2020-10-23 02:43:28 +02:00
|
|
|
# Google are missing; this is for backwards-compatibility with older
|
2020-06-08 03:58:37 +02:00
|
|
|
# Zulip versions where /etc/zulip/settings.py has not been migrated yet.
|
2021-02-12 08:20:45 +01:00
|
|
|
GOOGLE_OAUTH2_CLIENT_SECRET = get_secret("google_oauth2_client_secret")
|
2020-06-08 03:58:37 +02:00
|
|
|
SOCIAL_AUTH_GOOGLE_KEY = SOCIAL_AUTH_GOOGLE_KEY or GOOGLE_OAUTH2_CLIENT_ID
|
|
|
|
SOCIAL_AUTH_GOOGLE_SECRET = SOCIAL_AUTH_GOOGLE_SECRET or GOOGLE_OAUTH2_CLIENT_SECRET
|
|
|
|
|
|
|
|
if PRODUCTION:
|
|
|
|
SOCIAL_AUTH_SAML_SP_PUBLIC_CERT = get_from_file_if_exists("/etc/zulip/saml/zulip-cert.crt")
|
2021-02-12 08:19:30 +01:00
|
|
|
SOCIAL_AUTH_SAML_SP_PRIVATE_KEY = get_from_file_if_exists(
|
|
|
|
"/etc/zulip/saml/zulip-private-key.key"
|
|
|
|
)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
if "signatureAlgorithm" not in SOCIAL_AUTH_SAML_SECURITY_CONFIG:
|
|
|
|
# If the configuration doesn't explicitly specify the algorithm,
|
|
|
|
# we set RSA1 with SHA256 to override the python3-saml default, which uses
|
|
|
|
# insecure SHA1.
|
|
|
|
default_signature_alg = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"
|
|
|
|
SOCIAL_AUTH_SAML_SECURITY_CONFIG["signatureAlgorithm"] = default_signature_alg
|
|
|
|
|
|
|
|
for idp_name, idp_dict in SOCIAL_AUTH_SAML_ENABLED_IDPS.items():
|
|
|
|
if DEVELOPMENT:
|
2021-02-12 08:20:45 +01:00
|
|
|
idp_dict["entity_id"] = get_secret("saml_entity_id", "")
|
|
|
|
idp_dict["url"] = get_secret("saml_url", "")
|
|
|
|
idp_dict["x509cert_path"] = "zproject/dev_saml.cert"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# Set `x509cert` if not specified already; also support an override path.
|
2021-02-12 08:20:45 +01:00
|
|
|
if "x509cert" in idp_dict:
|
2020-06-08 03:58:37 +02:00
|
|
|
continue
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
if "x509cert_path" in idp_dict:
|
|
|
|
path = idp_dict["x509cert_path"]
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
|
|
|
path = f"/etc/zulip/saml/idps/{idp_name}.crt"
|
2021-02-12 08:20:45 +01:00
|
|
|
idp_dict["x509cert"] = get_from_file_if_exists(path)
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
SOCIAL_AUTH_PIPELINE = [
|
2021-02-12 08:20:45 +01:00
|
|
|
"social_core.pipeline.social_auth.social_details",
|
|
|
|
"zproject.backends.social_auth_associate_user",
|
|
|
|
"zproject.backends.social_auth_finish",
|
2020-06-08 03:58:37 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# EMAIL SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
|
|
|
# Django setting. Not used in the Zulip codebase.
|
|
|
|
DEFAULT_FROM_EMAIL = ZULIP_ADMINISTRATOR
|
|
|
|
|
|
|
|
if EMAIL_BACKEND is not None:
|
|
|
|
# If the server admin specified a custom email backend, use that.
|
|
|
|
pass
|
|
|
|
elif DEVELOPMENT:
|
|
|
|
# In the dev environment, emails are printed to the run-dev.py console.
|
2021-02-12 08:20:45 +01:00
|
|
|
EMAIL_BACKEND = "zproject.email_backends.EmailLogBackEnd"
|
2020-06-08 03:58:37 +02:00
|
|
|
elif not EMAIL_HOST:
|
|
|
|
# If an email host is not specified, fail gracefully
|
|
|
|
WARN_NO_EMAIL = True
|
2021-02-12 08:20:45 +01:00
|
|
|
EMAIL_BACKEND = "django.core.mail.backends.dummy.EmailBackend"
|
2020-06-08 03:58:37 +02:00
|
|
|
else:
|
2021-02-12 08:20:45 +01:00
|
|
|
EMAIL_BACKEND = "django.core.mail.backends.smtp.EmailBackend"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
2020-07-03 13:46:48 +02:00
|
|
|
EMAIL_TIMEOUT = 15
|
|
|
|
|
2020-10-30 12:56:23 +01:00
|
|
|
if DEVELOPMENT:
|
2021-02-12 08:20:45 +01:00
|
|
|
EMAIL_HOST = get_secret("email_host", "")
|
|
|
|
EMAIL_PORT = int(get_secret("email_port", "25"))
|
|
|
|
EMAIL_HOST_USER = get_secret("email_host_user", "")
|
|
|
|
EMAIL_USE_TLS = get_secret("email_use_tls", "") == "true"
|
2020-10-30 12:56:23 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
EMAIL_HOST_PASSWORD = get_secret("email_password")
|
|
|
|
EMAIL_GATEWAY_PASSWORD = get_secret("email_gateway_password")
|
|
|
|
AUTH_LDAP_BIND_PASSWORD = get_secret("auth_ldap_bind_password", "")
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
########################################################################
|
|
|
|
# MISC SETTINGS
|
|
|
|
########################################################################
|
|
|
|
|
2022-02-10 11:52:34 +01:00
|
|
|
# Convert INVITATION_LINK_VALIDITY_DAYS into minutes.
|
|
|
|
INVITATION_LINK_VALIDITY_MINUTES = 24 * 60 * INVITATION_LINK_VALIDITY_DAYS
|
|
|
|
|
2020-06-08 03:58:37 +02:00
|
|
|
if PRODUCTION:
|
|
|
|
# Filter out user data
|
2021-02-12 08:20:45 +01:00
|
|
|
DEFAULT_EXCEPTION_REPORTER_FILTER = "zerver.filters.ZulipExceptionReporterFilter"
|
2020-06-08 03:58:37 +02:00
|
|
|
|
|
|
|
# This is a debugging option only
|
|
|
|
PROFILE_ALL_REQUESTS = False
|
|
|
|
|
|
|
|
CROSS_REALM_BOT_EMAILS = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"notification-bot@zulip.com",
|
|
|
|
"welcome-bot@zulip.com",
|
|
|
|
"emailgateway@zulip.com",
|
2020-06-08 03:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
TWO_FACTOR_PATCH_ADMIN = False
|
2020-07-02 02:20:55 +02:00
|
|
|
|
2020-07-02 03:40:33 +02:00
|
|
|
# Allow the environment to override the default DSN
|
|
|
|
SENTRY_DSN = os.environ.get("SENTRY_DSN", SENTRY_DSN)
|
2020-07-02 02:20:55 +02:00
|
|
|
if SENTRY_DSN:
|
|
|
|
from .sentry import setup_sentry
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-07-15 20:32:35 +02:00
|
|
|
setup_sentry(SENTRY_DSN, get_config("machine", "deploy_type", "development"))
|
2021-09-10 18:36:56 +02:00
|
|
|
|
|
|
|
SCIM_SERVICE_PROVIDER = {
|
|
|
|
"USER_ADAPTER": "zerver.lib.scim.ZulipSCIMUser",
|
|
|
|
"USER_FILTER_PARSER": "zerver.lib.scim_filter.ZulipUserFilterQuery",
|
2021-10-18 16:30:46 +02:00
|
|
|
# NETLOC is actually overridden by the behavior of base_scim_location_getter,
|
2021-09-10 18:36:56 +02:00
|
|
|
# but django-scim2 requires it to be set, even though it ends up not being used.
|
|
|
|
# So we need to give it some value here, and EXTERNAL_HOST is the most generic.
|
|
|
|
"NETLOC": EXTERNAL_HOST,
|
|
|
|
"SCHEME": EXTERNAL_URI_SCHEME,
|
|
|
|
"GET_EXTRA_MODEL_FILTER_KWARGS_GETTER": "zerver.lib.scim.get_extra_model_filter_kwargs_getter",
|
|
|
|
"BASE_LOCATION_GETTER": "zerver.lib.scim.base_scim_location_getter",
|
|
|
|
"AUTHENTICATION_SCHEMES": [
|
|
|
|
{
|
|
|
|
"type": "bearer",
|
|
|
|
"name": "Bearer",
|
|
|
|
"description": "Bearer token",
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}
|