2024-07-12 02:30:17 +02:00
|
|
|
from typing import Any
|
2017-05-23 23:04:54 +02:00
|
|
|
|
2021-05-21 16:45:43 +02:00
|
|
|
from .config import get_secret
|
|
|
|
|
2018-04-06 03:00:51 +02:00
|
|
|
################################################################
|
2021-02-12 03:18:36 +01:00
|
|
|
## Zulip Server settings.
|
|
|
|
##
|
|
|
|
## This file controls settings that affect the whole Zulip server.
|
|
|
|
## See our documentation at:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/settings.html
|
|
|
|
##
|
|
|
|
## For developer documentation on the Zulip settings system, see:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/subsystems/settings.html
|
|
|
|
##
|
|
|
|
## Remember to restart the server after making changes here!
|
|
|
|
## su zulip -c /home/zulip/deployments/current/scripts/restart-server
|
2018-04-06 01:58:13 +02:00
|
|
|
|
2018-04-06 03:01:19 +02:00
|
|
|
|
2021-02-15 06:29:21 +01:00
|
|
|
################
|
2021-02-12 03:18:36 +01:00
|
|
|
## Mandatory settings.
|
|
|
|
##
|
|
|
|
## These settings MUST be set in production. In a development environment,
|
|
|
|
## sensible default values will be used.
|
|
|
|
|
|
|
|
## The email address for the person or team who maintains the Zulip
|
|
|
|
## installation. Note that this is a public-facing email address; it may
|
|
|
|
## appear on 404 pages, is used as the sender's address for many automated
|
|
|
|
## emails, and is advertised as a support address. An email address like
|
|
|
|
## support@example.com is totally reasonable, as is admin@example.com.
|
2022-04-28 20:55:34 +02:00
|
|
|
## Do not put a display name; e.g. "support@example.com", not
|
|
|
|
## "Zulip Support <support@example.com>".
|
2021-02-12 08:20:45 +01:00
|
|
|
ZULIP_ADMINISTRATOR = "zulip-admin@example.com"
|
2019-03-22 01:04:04 +01:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## The user-accessible Zulip hostname for this installation, e.g.
|
|
|
|
## zulip.example.com. This should match what users will put in their
|
|
|
|
## web browser. If you want to allow multiple hostnames, add the rest
|
|
|
|
## to ALLOWED_HOSTS.
|
|
|
|
##
|
|
|
|
## If you need to access the server on a specific port, you should set
|
|
|
|
## EXTERNAL_HOST to e.g. zulip.example.com:1234 here.
|
2021-02-12 08:20:45 +01:00
|
|
|
EXTERNAL_HOST = "zulip.example.com"
|
2013-10-17 16:33:04 +02:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Alternative hostnames. A comma-separated list of strings
|
|
|
|
## representing the host/domain names that your users can enter in
|
|
|
|
## their browsers to access Zulip. This is a security measure; for
|
|
|
|
## details, see the Django documentation:
|
2024-05-24 16:57:31 +02:00
|
|
|
## https://docs.djangoproject.com/en/5.0/ref/settings/#allowed-hosts
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
2022-04-28 20:55:34 +02:00
|
|
|
## Zulip automatically adds to this list "localhost", "127.0.0.1", and
|
2021-02-12 03:18:36 +01:00
|
|
|
## patterns representing EXTERNAL_HOST and subdomains of it. If you are
|
|
|
|
## accessing your server by other hostnames, list them here.
|
|
|
|
##
|
|
|
|
## Note that these should just be hostnames, without port numbers.
|
2022-04-28 20:55:34 +02:00
|
|
|
# ALLOWED_HOSTS = ["zulip-alias.example.com", "192.0.2.1"]
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## If EXTERNAL_HOST is not a valid domain name (e.g. an IP address),
|
|
|
|
## set FAKE_EMAIL_DOMAIN below to a domain that Zulip can use when
|
|
|
|
## generating (fake) email addresses for bots, dummy users, etc.
|
2022-04-28 20:55:34 +02:00
|
|
|
# FAKE_EMAIL_DOMAIN = "fake-domain.example.com"
|
2019-08-30 00:21:36 +02:00
|
|
|
|
2018-04-06 01:58:13 +02:00
|
|
|
|
2018-04-06 03:01:19 +02:00
|
|
|
################
|
2021-02-12 03:18:36 +01:00
|
|
|
## Outgoing email (SMTP) settings.
|
|
|
|
##
|
|
|
|
## Zulip needs to be able to send email (that is, use SMTP) so it can
|
|
|
|
## confirm new users' email addresses and send notifications.
|
|
|
|
##
|
|
|
|
## If you don't already have an SMTP provider, free ones are available.
|
|
|
|
##
|
|
|
|
## For more details, including a list of free SMTP providers and
|
|
|
|
## advice for troubleshooting, see the Zulip documentation:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/email.html
|
|
|
|
|
2023-02-27 18:19:32 +01:00
|
|
|
## EMAIL_HOST and EMAIL_HOST_USER are generally required. If your
|
|
|
|
## SMTP server does not require authentication, leave EMAIL_HOST_USER
|
|
|
|
## commented out.
|
2022-04-28 20:55:34 +02:00
|
|
|
# EMAIL_HOST = "smtp.example.com"
|
|
|
|
# EMAIL_HOST_USER = ""
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## Passwords and secrets are not stored in this file. The password
|
|
|
|
## for user EMAIL_HOST_USER goes in `/etc/zulip/zulip-secrets.conf`.
|
|
|
|
## In that file, set `email_password`. For example:
|
|
|
|
# email_password = abcd1234
|
|
|
|
|
|
|
|
## EMAIL_USE_TLS and EMAIL_PORT are required for most SMTP providers.
|
|
|
|
# EMAIL_USE_TLS = True
|
|
|
|
# EMAIL_PORT = 587
|
|
|
|
|
|
|
|
## The noreply address to be used as the sender for certain generated
|
|
|
|
## emails. Messages sent to this address could contain sensitive user
|
|
|
|
## data and should not be delivered anywhere. The default is
|
|
|
|
## e.g. noreply-{token}@zulip.example.com (if EXTERNAL_HOST is
|
|
|
|
## zulip.example.com). There are potential security issues if you set
|
|
|
|
## ADD_TOKENS_TO_NOREPLY_ADDRESS=False to remove the token; see
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/email.html for details.
|
|
|
|
# ADD_TOKENS_TO_NOREPLY_ADDRESS = True
|
|
|
|
# TOKENIZED_NOREPLY_EMAIL_ADDRESS = "noreply-{token}@example.com"
|
|
|
|
## NOREPLY_EMAIL_ADDRESS is the sender for noreply emails that don't
|
|
|
|
## contain confirmation links (where the security problem fixed by
|
|
|
|
## ADD_TOKENS_TO_NOREPLY_ADDRESS does not exist), as well as for
|
|
|
|
## confirmation emails when ADD_TOKENS_TO_NOREPLY_ADDRESS=False.
|
2022-04-28 20:55:34 +02:00
|
|
|
# NOREPLY_EMAIL_ADDRESS = "noreply@example.com"
|
2021-02-12 03:18:36 +01:00
|
|
|
|
2022-12-24 17:31:48 +01:00
|
|
|
## Emails sent by the Zulip server will use a sender name starting
|
|
|
|
## with INSTALLATION_NAME. The default is EXTERNAL_HOST. If INSTALLATION_NAME is
|
|
|
|
## "zulip.example.com", email senders names will include:
|
|
|
|
## * "zulip.example.com notifications" (message notification emails).
|
|
|
|
## * "zulip.example.com account security" (account security emails).
|
|
|
|
# INSTALLATION_NAME = "My Zulip Server"
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Many countries and bulk mailers require certain types of email to display
|
|
|
|
## a physical mailing address to comply with anti-spam legislation.
|
|
|
|
## Non-commercial and non-public-facing installations are unlikely to need
|
|
|
|
## this setting.
|
|
|
|
## The address should have no newlines.
|
2022-04-28 20:55:34 +02:00
|
|
|
# PHYSICAL_ADDRESS = ""
|
2017-10-19 04:09:53 +02:00
|
|
|
|
2018-04-06 03:01:19 +02:00
|
|
|
|
|
|
|
################
|
2021-02-05 08:30:30 +01:00
|
|
|
## Email gateway integration.
|
|
|
|
##
|
|
|
|
## The email gateway integration supports sending messages into Zulip
|
|
|
|
## by sending an email.
|
|
|
|
## For details, see the documentation:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/email-gateway.html
|
|
|
|
EMAIL_GATEWAY_PATTERN = ""
|
2021-02-12 03:18:36 +01:00
|
|
|
|
2021-02-05 08:30:30 +01:00
|
|
|
## If you are using polling, edit the IMAP settings below:
|
|
|
|
##
|
|
|
|
## The IMAP login; username here and password as email_gateway_password in
|
|
|
|
## zulip-secrets.conf.
|
|
|
|
EMAIL_GATEWAY_LOGIN = ""
|
|
|
|
## The IMAP server & port to connect to
|
|
|
|
EMAIL_GATEWAY_IMAP_SERVER = ""
|
|
|
|
EMAIL_GATEWAY_IMAP_PORT = 993
|
|
|
|
## The IMAP folder name to check for emails. All emails sent to EMAIL_GATEWAY_PATTERN above
|
|
|
|
## must be delivered to this folder
|
|
|
|
EMAIL_GATEWAY_IMAP_FOLDER = "INBOX"
|
|
|
|
|
|
|
|
|
|
|
|
################
|
|
|
|
## Authentication settings.
|
|
|
|
##
|
2021-02-12 03:18:36 +01:00
|
|
|
## Enable at least one of the following authentication backends.
|
|
|
|
## See https://zulip.readthedocs.io/en/latest/production/authentication-methods.html
|
|
|
|
## for documentation on our authentication backends.
|
|
|
|
##
|
|
|
|
## The install process requires EmailAuthBackend (the default) to be
|
|
|
|
## enabled. If you want to disable it, do so after creating the
|
|
|
|
## initial realm and user.
|
2024-07-12 02:30:17 +02:00
|
|
|
AUTHENTICATION_BACKENDS: tuple[str, ...] = (
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.EmailAuthBackend", # Email and password; just requires SMTP setup
|
2022-04-28 20:55:34 +02:00
|
|
|
# "zproject.backends.GoogleAuthBackend", # Google auth, setup below
|
|
|
|
# "zproject.backends.GitHubAuthBackend", # GitHub auth, setup below
|
|
|
|
# "zproject.backends.GitLabAuthBackend", # GitLab auth, setup below
|
|
|
|
# "zproject.backends.AzureADAuthBackend", # Microsoft Azure Active Directory auth, setup below
|
|
|
|
# "zproject.backends.AppleAuthBackend", # Apple auth, setup below
|
|
|
|
# "zproject.backends.SAMLAuthBackend", # SAML, setup below
|
|
|
|
# "zproject.backends.ZulipLDAPAuthBackend", # LDAP, setup below
|
|
|
|
# "zproject.backends.ZulipRemoteUserBackend", # Local SSO, setup docs on readthedocs
|
|
|
|
# "zproject.backends.GenericOpenIdConnectBackend", # Generic OIDC integration, setup below
|
2020-07-07 02:05:02 +02:00
|
|
|
)
|
2013-11-13 15:59:59 +01:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## LDAP integration.
|
|
|
|
##
|
|
|
|
## Zulip supports retrieving information about users via LDAP, and
|
|
|
|
## optionally using LDAP as an authentication mechanism.
|
2021-02-05 08:15:56 +01:00
|
|
|
|
|
|
|
import ldap
|
2022-10-30 00:07:03 +02:00
|
|
|
from django_auth_ldap.config import GroupOfNamesType, LDAPGroupQuery, LDAPSearch # noqa: F401
|
2021-02-05 08:15:56 +01:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Connecting to the LDAP server.
|
|
|
|
##
|
|
|
|
## For detailed instructions, see the Zulip documentation:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#ldap
|
|
|
|
|
|
|
|
## The LDAP server to connect to. Setting this enables Zulip
|
|
|
|
## automatically fetching each new user's name from LDAP.
|
|
|
|
# AUTH_LDAP_SERVER_URI = "ldaps://ldap.example.com"
|
|
|
|
|
|
|
|
## The DN of the user to bind as (i.e., authenticate as) in order to
|
|
|
|
## query LDAP. If unset, Zulip does an anonymous bind.
|
|
|
|
# AUTH_LDAP_BIND_DN = ""
|
|
|
|
|
|
|
|
## Passwords and secrets are not stored in this file. The password
|
|
|
|
## corresponding to AUTH_LDAP_BIND_DN goes in `/etc/zulip/zulip-secrets.conf`.
|
|
|
|
## In that file, set `auth_ldap_bind_password`. For example:
|
|
|
|
# auth_ldap_bind_password = abcd1234
|
|
|
|
|
|
|
|
## Mapping user info from LDAP to Zulip.
|
|
|
|
##
|
|
|
|
## For detailed instructions, see the Zulip documentation:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#ldap
|
|
|
|
|
|
|
|
## The LDAP search query to find a given user.
|
|
|
|
##
|
|
|
|
## The arguments to `LDAPSearch` are (base DN, scope, filter). In the
|
|
|
|
## filter, the string `%(user)s` is a Python placeholder. The Zulip
|
|
|
|
## server will replace this with the user's Zulip username, i.e. the
|
|
|
|
## name they type into the Zulip login form.
|
|
|
|
##
|
|
|
|
## For more details and alternatives, see the documentation linked above.
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearch(
|
|
|
|
"ou=users,dc=example,dc=com", ldap.SCOPE_SUBTREE, "(uid=%(user)s)"
|
|
|
|
)
|
2021-02-05 08:15:56 +01:00
|
|
|
|
docs: Add missing space to compound verbs “back up”, “log in”, etc.
Noun: backup, login, logout, lookup, setup.
Verb: back up, log in, log out, look up, set up.
Signed-off-by: Anders Kaseorg <anders@zulip.com>
2022-02-07 20:41:10 +01:00
|
|
|
## Configuration to look up a user's LDAP data given their email address
|
|
|
|
## (for Zulip reverse mapping). If users log in as e.g. "sam" when
|
2021-02-12 03:18:36 +01:00
|
|
|
## their email address is "sam@example.com", set LDAP_APPEND_DOMAIN to
|
|
|
|
## "example.com". Otherwise, leave LDAP_APPEND_DOMAIN=None and set
|
|
|
|
## AUTH_LDAP_REVERSE_EMAIL_SEARCH and AUTH_LDAP_USERNAME_ATTR below.
|
|
|
|
# LDAP_APPEND_DOMAIN = None
|
|
|
|
|
|
|
|
## LDAP attribute to find a user's email address.
|
|
|
|
##
|
|
|
|
## Leave as None if users log in with their email addresses,
|
|
|
|
## or if using LDAP_APPEND_DOMAIN.
|
|
|
|
# LDAP_EMAIL_ATTR = None
|
|
|
|
|
|
|
|
## AUTH_LDAP_REVERSE_EMAIL_SEARCH works like AUTH_LDAP_USER_SEARCH and
|
|
|
|
## should query an LDAP user given their email address. It and
|
|
|
|
## AUTH_LDAP_USERNAME_ATTR are required when LDAP_APPEND_DOMAIN is None.
|
|
|
|
# AUTH_LDAP_REVERSE_EMAIL_SEARCH = LDAPSearch("ou=users,dc=example,dc=com",
|
|
|
|
# ldap.SCOPE_SUBTREE, "(email=%(email)s)")
|
|
|
|
|
|
|
|
## AUTH_LDAP_USERNAME_ATTR should be the Zulip username attribute
|
|
|
|
## (defined in AUTH_LDAP_USER_SEARCH).
|
|
|
|
# AUTH_LDAP_USERNAME_ATTR = "uid"
|
|
|
|
|
|
|
|
## This map defines how to populate attributes of a Zulip user from LDAP.
|
|
|
|
##
|
|
|
|
## The format is `zulip_name: ldap_name`; each entry maps a Zulip
|
|
|
|
## concept (on the left) to the LDAP attribute name (on the right) your
|
|
|
|
## LDAP database uses for the same concept.
|
2021-02-05 08:15:56 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP = {
|
2021-02-12 03:18:36 +01:00
|
|
|
## full_name is required; common values include "cn" or "displayName".
|
|
|
|
## If names are encoded in your LDAP directory as first and last
|
|
|
|
## name, you can instead specify first_name and last_name, and
|
|
|
|
## Zulip will combine those to construct a full_name automatically.
|
2021-02-05 08:15:56 +01:00
|
|
|
"full_name": "cn",
|
|
|
|
# "first_name": "fn",
|
|
|
|
# "last_name": "ln",
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## Profile pictures can be pulled from the LDAP "thumbnailPhoto"/"jpegPhoto" field.
|
2021-02-05 08:15:56 +01:00
|
|
|
# "avatar": "thumbnailPhoto",
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## This line is for having Zulip to automatically deactivate users
|
|
|
|
## who are disabled in LDAP/Active Directory (and reactivate users who are not).
|
|
|
|
## See docs for usage details and precise semantics.
|
2021-02-05 08:15:56 +01:00
|
|
|
# "userAccountControl": "userAccountControl",
|
2021-09-16 20:04:19 +02:00
|
|
|
## Alternatively, you can map "deactivated" to a boolean attribute
|
|
|
|
## that is "TRUE" for deactivated users and "FALSE" otherwise.
|
|
|
|
# "deactivated": "nsAccountLock",
|
2020-08-15 18:33:16 +02:00
|
|
|
## Restrict access to organizations using an LDAP attribute.
|
|
|
|
## See https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#restricting-ldap-user-access-to-specific-organizations
|
|
|
|
# "org_membership": "department",
|
2021-02-05 08:15:56 +01:00
|
|
|
}
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Whether to automatically deactivate users not found in LDAP. If LDAP
|
|
|
|
## is the only authentication method, then this setting defaults to
|
|
|
|
## True. If other authentication methods are enabled, it defaults to
|
|
|
|
## False.
|
|
|
|
# LDAP_DEACTIVATE_NON_MATCHING_USERS = True
|
2021-02-05 08:15:56 +01:00
|
|
|
|
2020-09-22 18:18:45 +02:00
|
|
|
## See: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#restricting-ldap-user-access-to-specific-organizations
|
|
|
|
# AUTH_LDAP_ADVANCED_REALM_ACCESS_CONTROL = {
|
|
|
|
# "zulip":
|
|
|
|
# [ # OR
|
|
|
|
# { # AND
|
|
|
|
# "department": "main",
|
|
|
|
# "employeeType": "staff"
|
|
|
|
# }
|
|
|
|
# ]
|
|
|
|
# }
|
2021-02-05 08:15:56 +01:00
|
|
|
|
2023-07-15 22:25:36 +02:00
|
|
|
|
|
|
|
## LDAP group sync configuration.
|
|
|
|
## See: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#synchronizing-groups
|
|
|
|
# AUTH_LDAP_GROUP_TYPE = GroupOfUniqueNamesType()
|
|
|
|
# AUTH_LDAP_GROUP_SEARCH = LDAPSearch(
|
|
|
|
# "ou=groups,dc=www,dc=example,dc=com", ldap.SCOPE_SUBTREE, "(objectClass=groupOfUniqueNames)"
|
|
|
|
# )
|
|
|
|
# LDAP_SYNCHRONIZED_GROUPS_BY_REALM = {
|
|
|
|
# "subdomain1" : [
|
|
|
|
# "group1",
|
|
|
|
# "group2",
|
|
|
|
# ]
|
|
|
|
# }
|
|
|
|
|
2018-04-06 03:05:13 +02:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## Google OAuth.
|
|
|
|
##
|
|
|
|
## To set up Google authentication, you'll need to do the following:
|
|
|
|
##
|
|
|
|
## (1) Visit https://console.developers.google.com/ , navigate to
|
|
|
|
## "APIs & Services" > "Credentials", and create a "Project" which will
|
|
|
|
## correspond to your Zulip instance.
|
|
|
|
##
|
2022-03-10 22:42:44 +01:00
|
|
|
## (2) Go to "Oauth consent screen" and create a consent screen,
|
|
|
|
## authorizing your domain and enabling the .../auth/userinfo.email,
|
|
|
|
## .../auth/userinfo.profile and openid scopes. If all of your users
|
|
|
|
## share a Google Workspace, you can select the "Internal" user type
|
|
|
|
## during Oauth screen creation to limit authentication via this
|
|
|
|
## backend to users within your Google Workspace organization.
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## (3) Return to "Credentials", and select "Create credentials".
|
2022-03-10 22:42:44 +01:00
|
|
|
## Choose "OAuth client ID", and fill in the app name as desired
|
|
|
|
## and "Authorized redirect URIs" with a value like
|
2021-02-12 03:18:36 +01:00
|
|
|
## https://zulip.example.com/complete/google/
|
|
|
|
## based on your value for EXTERNAL_HOST.
|
|
|
|
##
|
|
|
|
## (4) You should get a client ID and a client secret. Copy them.
|
|
|
|
## Use the client ID as `SOCIAL_AUTH_GOOGLE_KEY` here, and put the
|
|
|
|
## client secret in zulip-secrets.conf as `social_auth_google_secret`.
|
2022-04-28 20:55:19 +02:00
|
|
|
# SOCIAL_AUTH_GOOGLE_KEY = "<your client ID from Google>"
|
2016-07-29 21:34:17 +02:00
|
|
|
|
2021-02-15 06:29:21 +01:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## GitLab OAuth.
|
|
|
|
##
|
|
|
|
## To set up GitLab authentication, you'll need to do the following:
|
|
|
|
##
|
|
|
|
## (1) Register an OAuth application with GitLab at
|
|
|
|
## https://gitlab.com/oauth/applications
|
|
|
|
## Or the equivalent URL on a self-hosted GitLab server.
|
|
|
|
## (2) Fill in the "Redirect URI" with a value like
|
|
|
|
## http://zulip.example.com/complete/gitlab/
|
|
|
|
## based on your value for EXTERNAL_HOST.
|
|
|
|
## (3) For "scopes", select only "read_user", and create the application.
|
|
|
|
## (4) You'll end up on a page with the Application ID and Secret for
|
2021-05-10 07:02:14 +02:00
|
|
|
## your new GitLab application. Use the Application ID as
|
2021-02-12 03:18:36 +01:00
|
|
|
## `SOCIAL_AUTH_GITLAB_KEY` here, and put the Secret in
|
|
|
|
## zulip-secrets.conf as `social_auth_gitlab_secret`.
|
|
|
|
## (5) If you are self-hosting GitLab, provide the URL of the
|
|
|
|
## GitLab server as SOCIAL_AUTH_GITLAB_API_URL here.
|
2022-04-28 20:55:19 +02:00
|
|
|
# SOCIAL_AUTH_GITLAB_KEY = "<your Application ID from GitLab>"
|
|
|
|
# SOCIAL_AUTH_GITLAB_API_URL = "https://gitlab.example.com"
|
2020-01-31 18:19:53 +01:00
|
|
|
|
2018-04-06 03:05:13 +02:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## GitHub OAuth.
|
|
|
|
##
|
|
|
|
## To set up GitHub authentication, you'll need to do the following:
|
|
|
|
##
|
|
|
|
## (1) Register an OAuth2 application with GitHub at one of:
|
|
|
|
## https://github.com/settings/developers
|
|
|
|
## https://github.com/organizations/ORGNAME/settings/developers
|
|
|
|
## Fill in "Callback URL" with a value like
|
|
|
|
## https://zulip.example.com/complete/github/ as
|
|
|
|
## based on your values for EXTERNAL_HOST and SOCIAL_AUTH_SUBDOMAIN.
|
|
|
|
##
|
|
|
|
## (2) You should get a page with settings for your new application,
|
|
|
|
## showing a client ID and a client secret. Use the client ID as
|
|
|
|
## `SOCIAL_AUTH_GITHUB_KEY` here, and put the client secret in
|
|
|
|
## zulip-secrets.conf as `social_auth_github_secret`.
|
2022-04-28 20:55:19 +02:00
|
|
|
# SOCIAL_AUTH_GITHUB_KEY = "<your client ID from GitHub>"
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## (3) Optionally, you can configure the GitHub integration to only
|
|
|
|
## allow members of a particular GitHub team or organization to log
|
|
|
|
## into your Zulip server through GitHub authentication. To enable
|
|
|
|
## this, set one of the two parameters below:
|
2022-04-28 20:55:19 +02:00
|
|
|
# SOCIAL_AUTH_GITHUB_TEAM_ID = "<your team id>"
|
|
|
|
# SOCIAL_AUTH_GITHUB_ORG_NAME = "<your org name>"
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## (4) If you are serving multiple Zulip organizations on different
|
|
|
|
## subdomains, you need to set SOCIAL_AUTH_SUBDOMAIN. You can set it
|
|
|
|
## to any subdomain on which you do not plan to host a Zulip
|
|
|
|
## organization. The default recommendation, `auth`, is a reserved
|
|
|
|
## subdomain; if you're using this setting, the "Callback URL" should be e.g.:
|
|
|
|
## https://auth.zulip.example.com/complete/github/
|
|
|
|
#
|
2022-04-28 20:55:34 +02:00
|
|
|
# SOCIAL_AUTH_SUBDOMAIN = "auth"
|
2018-07-10 08:07:23 +02:00
|
|
|
|
2021-05-21 16:45:43 +02:00
|
|
|
########
|
|
|
|
## Generic OpenID Connect (OIDC). See also documentation here:
|
|
|
|
##
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#openid-connect
|
|
|
|
##
|
|
|
|
|
2024-07-12 02:30:17 +02:00
|
|
|
SOCIAL_AUTH_OIDC_ENABLED_IDPS: dict[str, Any] = {
|
2021-05-21 16:45:43 +02:00
|
|
|
## This field (example: "idp_name") may appear in URLs during
|
|
|
|
## authentication, but is otherwise not user-visible.
|
|
|
|
"idp_name": {
|
|
|
|
## The base path to the provider's OIDC API. Zulip fetches the
|
|
|
|
## IdP's configuration from the discovery endpoint, which will be
|
|
|
|
## "{oidc_url}/.well-known/openid-configuration".
|
|
|
|
"oidc_url": "https://example.com/api/openid",
|
|
|
|
## The display name, used for "Log in with <display name>" buttons.
|
|
|
|
"display_name": "Example",
|
|
|
|
## Optional: URL of an icon to decorate "Log in with <display name>" buttons.
|
|
|
|
"display_icon": None,
|
|
|
|
## The client_id and secret provided by your OIDC IdP. To keep
|
|
|
|
## settings.py free of secrets, the get_secret call below
|
|
|
|
## reads the secret with the specified name from zulip-secrets.conf.
|
|
|
|
"client_id": "<your client id>",
|
|
|
|
"secret": get_secret("social_auth_oidc_secret"),
|
2021-07-16 11:44:11 +02:00
|
|
|
## Determines whether "Log in with OIDC" will automatically
|
|
|
|
## register a new account if one does not already exist. By
|
|
|
|
## default, Zulip asks the user whether they want to create an
|
|
|
|
## account or try to log in again using another method.
|
|
|
|
# "auto_signup": False,
|
2021-05-21 16:45:43 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-21 13:54:20 +02:00
|
|
|
## For documentation on this setting, see the relevant part of
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#openid-connect
|
2021-05-23 12:00:20 +02:00
|
|
|
# SOCIAL_AUTH_OIDC_FULL_NAME_VALIDATED = True
|
|
|
|
|
2019-09-29 06:32:56 +02:00
|
|
|
########
|
2021-05-10 07:02:14 +02:00
|
|
|
## SAML authentication
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## For SAML authentication, you will need to configure the settings
|
2021-05-10 07:02:14 +02:00
|
|
|
## below using information from your SAML identity provider, as
|
2021-02-12 03:18:36 +01:00
|
|
|
## explained in:
|
|
|
|
##
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#saml
|
|
|
|
##
|
|
|
|
## You will need to modify these SAML settings:
|
2019-09-29 06:32:56 +02:00
|
|
|
SOCIAL_AUTH_SAML_ORG_INFO = {
|
|
|
|
"en-US": {
|
2019-10-28 23:21:49 +01:00
|
|
|
"displayname": "Example, Inc. Zulip",
|
|
|
|
"name": "zulip",
|
2021-02-12 08:20:45 +01:00
|
|
|
"url": "{}{}".format("https://", EXTERNAL_HOST),
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2019-09-29 06:32:56 +02:00
|
|
|
}
|
2024-07-12 02:30:17 +02:00
|
|
|
SOCIAL_AUTH_SAML_ENABLED_IDPS: dict[str, Any] = {
|
2021-02-12 03:18:36 +01:00
|
|
|
## The fields are explained in detail here:
|
|
|
|
## https://python-social-auth.readthedocs.io/en/latest/backends/saml.html
|
2019-09-29 06:32:56 +02:00
|
|
|
"idp_name": {
|
2021-02-12 03:18:36 +01:00
|
|
|
## Configure entity_id and url according to information provided to you by your IdP:
|
2019-09-29 06:32:56 +02:00
|
|
|
"entity_id": "https://idp.testshib.org/idp/shibboleth",
|
|
|
|
"url": "https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO",
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## The part below corresponds to what's likely referred to as something like
|
2022-02-07 22:32:06 +01:00
|
|
|
## "Attribute Statements" (with Okta as your IdP) or "Attribute Mapping" (with Google Workspace).
|
2021-02-12 03:18:36 +01:00
|
|
|
## The names on the right side need to correspond to the names under which
|
|
|
|
## the IdP will send the user attributes. With these defaults, it's expected
|
|
|
|
## that the user's email will be sent with the "email" attribute name,
|
|
|
|
## the first name and the last name with the "first_name", "last_name" attribute names.
|
2019-09-29 06:32:56 +02:00
|
|
|
"attr_user_permanent_id": "email",
|
|
|
|
"attr_first_name": "first_name",
|
|
|
|
"attr_last_name": "last_name",
|
|
|
|
"attr_username": "email",
|
|
|
|
"attr_email": "email",
|
2021-05-31 14:48:12 +02:00
|
|
|
## List of additional attributes to fetch from the SAMLResponse.
|
|
|
|
## These attributes will be available for synchronizing custom profile fields.
|
|
|
|
## in SOCIAL_AUTH_SYNC_CUSTOM_ATTRS_DICT.
|
|
|
|
# "extra_attrs": ["title", "mobilePhone"],
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## The "x509cert" attribute is automatically read from
|
|
|
|
## /etc/zulip/saml/idps/{idp_name}.crt; don't specify it here.
|
|
|
|
##
|
|
|
|
## Optionally, you can edit display_name and display_icon
|
|
|
|
## settings below to change the name and icon that will show on
|
|
|
|
## the login button.
|
2019-10-22 18:23:57 +02:00
|
|
|
"display_name": "SAML",
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## Path to a square image file containing a logo to appear at
|
|
|
|
## the left end of the login/register buttons for this IDP.
|
|
|
|
## The default of None results in a text-only button.
|
2019-11-05 00:08:27 +01:00
|
|
|
# "display_icon": "/path/to/icon.png",
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## If you want this IdP to only be enabled for authentication
|
|
|
|
## to certain subdomains, uncomment and edit the setting below.
|
2020-04-10 16:30:02 +02:00
|
|
|
# "limit_to_subdomains": ["subdomain1", "subdomain2"],
|
2021-02-12 03:18:36 +01:00
|
|
|
##
|
|
|
|
## You can also limit subdomains by setting "attr_org_membership"
|
|
|
|
## to be a SAML attribute containing the allowed subdomains for a user.
|
2020-06-19 21:44:29 +02:00
|
|
|
# "attr_org_membership": "member",
|
2021-06-13 14:18:28 +02:00
|
|
|
##
|
|
|
|
## Determines whether "Log in with SAML" will automatically
|
|
|
|
## register a new account if one does not already exist. By
|
|
|
|
## default, Zulip asks the user whether they want to create an
|
|
|
|
## account or try to log in again using another method.
|
|
|
|
# "auto_signup": False,
|
2022-11-12 21:44:02 +01:00
|
|
|
## Determines whether Service Provider initiated SAML Single Logout should be enabled.
|
|
|
|
## Note that IdP-initiated Single Logout must be configured before enabling this.
|
|
|
|
# "sp_initiated_logout_enabled": False,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2019-09-29 06:32:56 +02:00
|
|
|
}
|
|
|
|
|
2021-09-15 14:43:19 +02:00
|
|
|
# More complete documentation of the configurable security settings
|
|
|
|
# are available in the "security" part of https://github.com/onelogin/python3-saml#settings.
|
2024-07-12 02:30:17 +02:00
|
|
|
SOCIAL_AUTH_SAML_SECURITY_CONFIG: dict[str, Any] = {
|
2021-02-12 03:18:36 +01:00
|
|
|
## If you've set up the optional private and public server keys,
|
|
|
|
## set this to True to enable signing of SAMLRequests using the
|
|
|
|
## private key.
|
2019-09-29 06:32:56 +02:00
|
|
|
"authnRequestsSigned": False,
|
2021-09-15 00:14:16 +02:00
|
|
|
## If you'd like the Zulip server to request that the IdP limit user identity
|
|
|
|
## verification to a specific set of authentication contexts, you can do this
|
|
|
|
## by changing the requestedAuthnContext parameter to a list of specific
|
|
|
|
## Authentication Context Classes that you want to include in the AuthnContext. E.g.:
|
|
|
|
##
|
|
|
|
# "requestedAuthnContext": ["urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
|
|
# "urn:oasis:names:tc:SAML:2.0:ac:classes:X509"],
|
|
|
|
##
|
2021-09-15 14:43:19 +02:00
|
|
|
## For details on this, see the aforementioned python3-saml documentation
|
2021-09-15 00:14:16 +02:00
|
|
|
## and https://docs.oasis-open.org/security/saml/v2.0/saml-authn-context-2.0-os.pdf
|
|
|
|
"requestedAuthnContext": False,
|
2020-07-07 02:05:02 +02:00
|
|
|
}
|
2019-09-29 06:32:56 +02:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## These SAML settings you likely won't need to modify.
|
2021-02-12 08:20:45 +01:00
|
|
|
SOCIAL_AUTH_SAML_SP_ENTITY_ID = "https://" + EXTERNAL_HOST
|
2019-09-29 06:32:56 +02:00
|
|
|
SOCIAL_AUTH_SAML_TECHNICAL_CONTACT = {
|
|
|
|
"givenName": "Technical team",
|
|
|
|
"emailAddress": ZULIP_ADMINISTRATOR,
|
|
|
|
}
|
|
|
|
SOCIAL_AUTH_SAML_SUPPORT_CONTACT = {
|
|
|
|
"givenName": "Support team",
|
|
|
|
"emailAddress": ZULIP_ADMINISTRATOR,
|
|
|
|
}
|
2018-10-05 14:32:02 +02:00
|
|
|
|
2021-05-31 14:48:12 +02:00
|
|
|
# SOCIAL_AUTH_SYNC_CUSTOM_ATTRS_DICT = {
|
|
|
|
# "example_org": {
|
|
|
|
# "saml": {
|
|
|
|
# # Format: "<custom profile field name>": "<attribute name from extra_attrs above>"
|
|
|
|
# "title": "title",
|
|
|
|
# "phone_number": "mobilePhone",
|
|
|
|
# }
|
|
|
|
# }
|
|
|
|
# }
|
|
|
|
|
2020-06-09 12:04:21 +02:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## Apple authentication ("Sign in with Apple").
|
|
|
|
##
|
|
|
|
## Configure the below settings by following the instructions here:
|
|
|
|
##
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#sign-in-with-apple
|
2020-06-09 12:04:21 +02:00
|
|
|
#
|
2021-02-12 03:18:36 +01:00
|
|
|
# SOCIAL_AUTH_APPLE_TEAM = "<your Team ID>"
|
|
|
|
# SOCIAL_AUTH_APPLE_SERVICES_ID = "<your Services ID>"
|
|
|
|
# SOCIAL_AUTH_APPLE_APP_ID = "<your App ID>"
|
|
|
|
# SOCIAL_AUTH_APPLE_KEY = "<your Key ID>"
|
2020-06-09 12:04:21 +02:00
|
|
|
|
2018-10-05 14:32:02 +02:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## Azure Active Directory OAuth.
|
|
|
|
##
|
|
|
|
## To set up Microsoft Azure AD authentication, you'll need to do the following:
|
|
|
|
##
|
2022-09-05 13:30:17 +02:00
|
|
|
## (1) Open "App registrations" at
|
|
|
|
## https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade
|
|
|
|
## and click "New registration".
|
|
|
|
##
|
|
|
|
## (2) In the "Redirect URI (optional)" section, select Web as the platform
|
|
|
|
## and enter https://zulip.example.com/complete/azuread-oauth2/ as the redirect URI,
|
|
|
|
## based on your values of EXTERNAL_HOST and SOCIAL_AUTH_SUBDOMAIN.
|
|
|
|
##
|
|
|
|
## (3) After registering the app, go to "Certificates & secrets" and
|
|
|
|
## generate a new client secret. Make sure to save the generated Value.
|
|
|
|
##
|
|
|
|
## (4) Enter the application ID for the app as SOCIAL_AUTH_AZUREAD_OAUTH2_KEY below
|
|
|
|
## and the generated secret Value in zulip-secrets.conf as `social_auth_azuread_oauth2_secret`.
|
2022-04-28 20:55:34 +02:00
|
|
|
# SOCIAL_AUTH_AZUREAD_OAUTH2_KEY = ""
|
2018-10-05 14:32:02 +02:00
|
|
|
|
2018-04-06 03:05:13 +02:00
|
|
|
########
|
2021-02-12 03:18:36 +01:00
|
|
|
## SSO via REMOTE_USER.
|
|
|
|
##
|
|
|
|
## If you are using the ZulipRemoteUserBackend authentication backend,
|
|
|
|
## and REMOTE_USER does not already include a domain, set this to your
|
|
|
|
## domain (e.g. if REMOTE_USER is "username" and the corresponding
|
|
|
|
## email address is "username@example.com", set SSO_APPEND_DOMAIN =
|
|
|
|
## "example.com"), otherwise leave this as None.
|
|
|
|
# SSO_APPEND_DOMAIN = None
|
2013-11-13 15:59:59 +01:00
|
|
|
|
2022-09-13 17:39:18 +02:00
|
|
|
## JWT authentication.
|
|
|
|
##
|
|
|
|
## JWT authentication is supported both to transparently log users
|
|
|
|
## into Zulip or to fetch users' API keys. The JWT secret key and
|
|
|
|
## algorithm must be configured here.
|
|
|
|
##
|
|
|
|
## See https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#jwt
|
|
|
|
# JWT_AUTH_KEYS: Dict[str, Any] = {
|
|
|
|
# # Subdomain for which this JWT configuration will apply.
|
|
|
|
# "zulip": {
|
|
|
|
# # Shared secret key used to validate jwt tokens, which should be stored
|
|
|
|
# # in zulip-secrets.conf and is read by the get_secret call below.
|
|
|
|
# # The key needs to be securely, randomly generated. Note that if you're
|
|
|
|
# # using the default HS256 algorithm, per RFC 7518, the key needs
|
|
|
|
# # to have at least 256 bits of entropy.
|
|
|
|
# "key": get_secret("jwt_auth_key"),
|
|
|
|
# # Algorithm with which the JWT token are signed.
|
|
|
|
# "algorithms": ["HS256"],
|
|
|
|
# }
|
|
|
|
# }
|
|
|
|
|
2021-02-16 00:53:01 +01:00
|
|
|
################
|
|
|
|
## Service configuration
|
|
|
|
|
|
|
|
########
|
|
|
|
## PostgreSQL configuration.
|
|
|
|
##
|
|
|
|
## To access an external PostgreSQL database you should define the host name in
|
|
|
|
## REMOTE_POSTGRES_HOST, port in REMOTE_POSTGRES_PORT, password in the secrets file in the
|
|
|
|
## property postgres_password, and the SSL connection mode in REMOTE_POSTGRES_SSLMODE
|
|
|
|
## Valid values for REMOTE_POSTGRES_SSLMODE are documented in the
|
|
|
|
## "SSL Mode Descriptions" table in
|
|
|
|
## https://www.postgresql.org/docs/9.5/static/libpq-ssl.html
|
2022-04-28 20:55:34 +02:00
|
|
|
# REMOTE_POSTGRES_HOST = "dbserver.example.com"
|
|
|
|
# REMOTE_POSTGRES_PORT = "5432"
|
|
|
|
# REMOTE_POSTGRES_SSLMODE = "require"
|
2021-02-16 00:53:01 +01:00
|
|
|
|
|
|
|
########
|
|
|
|
## RabbitMQ configuration.
|
|
|
|
##
|
2023-02-16 17:19:57 +01:00
|
|
|
## By default, Zulip connects to RabbitMQ running locally on the
|
|
|
|
## machine, but Zulip also supports connecting to RabbitMQ over the
|
|
|
|
## network; to use a remote RabbitMQ instance, set RABBITMQ_HOST, and
|
|
|
|
## optionally RABBITMQ_PORT, to the hostname and port here.
|
2021-02-16 00:53:01 +01:00
|
|
|
# RABBITMQ_HOST = "127.0.0.1"
|
2023-02-16 17:19:57 +01:00
|
|
|
# RABBITMQ_PORT = 5672
|
2024-05-31 17:47:15 +02:00
|
|
|
## To use a different RabbitMQ "virtual host", adjust this.
|
|
|
|
# RABBITMQ_VHOST = "/"
|
2022-04-28 20:55:34 +02:00
|
|
|
## To use another RabbitMQ user than the default "zulip", set RABBITMQ_USERNAME here.
|
|
|
|
# RABBITMQ_USERNAME = "zulip"
|
2023-03-23 20:04:19 +01:00
|
|
|
## To access the RabbitMQ server over TLS, set this to True; this is
|
|
|
|
## generally only necessary if RabbitMQ is running on a separate,
|
|
|
|
## cloud-managed, host.
|
|
|
|
# RABBITMQ_USE_TLS = False
|
2021-02-16 00:53:01 +01:00
|
|
|
|
|
|
|
########
|
|
|
|
## Redis configuration.
|
|
|
|
##
|
|
|
|
## By default, Zulip connects to Redis running locally on the machine,
|
|
|
|
## but Zulip also supports connecting to Redis over the network;
|
|
|
|
## to use a remote Redis instance, set REDIS_HOST here.
|
2022-04-28 20:55:34 +02:00
|
|
|
# REDIS_HOST = "127.0.0.1"
|
2021-02-16 00:53:01 +01:00
|
|
|
## For a different Redis port set the REDIS_PORT here.
|
|
|
|
# REDIS_PORT = 6379
|
|
|
|
## If you set redis_password in zulip-secrets.conf, Zulip will use that password
|
|
|
|
## to connect to the Redis server.
|
|
|
|
|
|
|
|
########
|
|
|
|
## Memcached configuration.
|
|
|
|
##
|
|
|
|
## By default, Zulip connects to memcached running locally on the machine,
|
|
|
|
## but Zulip also supports connecting to memcached over the network;
|
|
|
|
## to use a remote Memcached instance, set MEMCACHED_LOCATION here.
|
|
|
|
## Format HOST:PORT
|
|
|
|
# MEMCACHED_LOCATION = 127.0.0.1:11211
|
|
|
|
## To authenticate to memcached, set memcached_password in zulip-secrets.conf,
|
2022-04-28 20:55:34 +02:00
|
|
|
## and optionally change the default username "zulip@localhost" here.
|
|
|
|
# MEMCACHED_USERNAME = "zulip@localhost"
|
2021-02-16 00:53:01 +01:00
|
|
|
|
|
|
|
|
|
|
|
################
|
|
|
|
## Previews.
|
|
|
|
|
|
|
|
########
|
|
|
|
## Image and URL previews.
|
|
|
|
##
|
|
|
|
## Controls whether or not Zulip will provide inline image preview when
|
|
|
|
## a link to an image is referenced in a message. Note: this feature
|
|
|
|
## can also be disabled in a realm's organization settings.
|
|
|
|
# INLINE_IMAGE_PREVIEW = True
|
|
|
|
|
|
|
|
## Controls whether or not Zulip will provide inline previews of
|
|
|
|
## websites that are referenced in links in messages. Note: this feature
|
|
|
|
## can also be disabled in a realm's organization settings.
|
|
|
|
# INLINE_URL_EMBED_PREVIEW = True
|
|
|
|
|
|
|
|
########
|
|
|
|
## Twitter previews.
|
|
|
|
##
|
|
|
|
## Zulip supports showing inline Tweet previews when a tweet is linked
|
|
|
|
## to in a message. To support this, Zulip must have access to the
|
|
|
|
## Twitter API via OAuth. To obtain the various access tokens needed
|
|
|
|
## below, you must register a new application under your Twitter
|
|
|
|
## account by doing the following:
|
|
|
|
##
|
|
|
|
## 1. Log in to http://dev.twitter.com.
|
|
|
|
## 2. In the menu under your username, click My Applications. From this page, create a new application.
|
|
|
|
## 3. Click on the application you created and click "create my access token".
|
|
|
|
## 4. Fill in the values for twitter_consumer_key, twitter_consumer_secret, twitter_access_token_key,
|
|
|
|
## and twitter_access_token_secret in /etc/zulip/zulip-secrets.conf.
|
|
|
|
|
|
|
|
|
|
|
|
################
|
|
|
|
## Logging and error reporting.
|
|
|
|
##
|
|
|
|
## Controls whether or not error reports (tracebacks) are emailed to the
|
|
|
|
## server administrators.
|
|
|
|
# ERROR_REPORTING = True
|
|
|
|
|
|
|
|
## Controls the DSN used to report errors to Sentry.io
|
sentry: Add frontend event monitoring.
Zulip already has integrations for server-side Sentry integration;
however, it has historically used the Zulip-specific `blueslip`
library for monitoring browser-side errors. However, the latter sends
errors to email, as well optionally to an internal `#errors` stream.
While this is sufficient for low volumes of users, and useful in that
it does not rely on outside services, at higher volumes it is very
difficult to do any analysis or filtering of the errors. Client-side
errors are exceptionally noisy, with many false positives due to
browser extensions or similar, so determining real real errors from a
stream of un-grouped emails or messages in a stream is quite
difficult.
Add a client-side Javascript sentry integration. To provide useful
backtraces, this requires extending the pre-deploy hooks to upload the
source-maps to Sentry. Additional keys are added to the non-public
API of `page_params` to control the DSN, realm identifier, and sample
rates.
2023-02-13 20:50:57 +01:00
|
|
|
# SENTRY_DSN = "https://aaa@bbb.ingest.sentry.io/1234"
|
|
|
|
# SENTRY_FRONTEND_DSN = "https://aaa@bbb.ingest.sentry.io/1234"
|
|
|
|
## What portion of events are sampled (https://docs.sentry.io/platforms/javascript/configuration/sampling/):
|
|
|
|
# SENTRY_FRONTEND_SAMPLE_RATE = 1.0
|
|
|
|
# SENTRY_FRONTEND_TRACE_RATE = 0.1
|
2021-02-16 00:53:01 +01:00
|
|
|
|
|
|
|
## If True, each log message in the server logs will identify the
|
|
|
|
## Python module where it came from. Useful for tracking down a
|
|
|
|
## mysterious log message, but a little verbose.
|
|
|
|
# LOGGING_SHOW_MODULE = False
|
|
|
|
|
|
|
|
## If True, each log message in the server logs will identify the
|
|
|
|
## process ID. Useful for correlating logs with information from
|
|
|
|
## system-level monitoring tools.
|
|
|
|
# LOGGING_SHOW_PID = False
|
|
|
|
|
2021-03-19 13:21:18 +01:00
|
|
|
#################
|
|
|
|
## Animated GIF integration powered by GIPHY. See:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/giphy-gif-integration.html
|
|
|
|
# GIPHY_API_KEY = "<Your API key from GIPHY>"
|
2021-02-16 00:53:01 +01:00
|
|
|
|
2021-02-16 00:52:16 +01:00
|
|
|
################
|
|
|
|
## Video call integrations.
|
|
|
|
##
|
|
|
|
## Controls the Zoom video call integration. See:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/video-calls.html
|
2022-04-28 20:55:19 +02:00
|
|
|
# VIDEO_ZOOM_CLIENT_ID = "<your Zoom client ID>"
|
2021-02-16 00:52:16 +01:00
|
|
|
|
|
|
|
## Controls the Jitsi Meet video call integration. By default, the
|
|
|
|
## integration uses the SaaS https://meet.jit.si server. You can specify
|
|
|
|
## your own Jitsi Meet server, or if you'd like to disable the
|
|
|
|
## integration, set JITSI_SERVER_URL = None.
|
2022-04-28 20:55:34 +02:00
|
|
|
# JITSI_SERVER_URL = "https://jitsi.example.com"
|
2021-02-16 00:52:16 +01:00
|
|
|
|
2021-07-06 00:23:51 +02:00
|
|
|
## Controls the BigBlueButton video call integration. You must also
|
2021-02-16 00:52:16 +01:00
|
|
|
## set big_blue_button_secret in zulip-secrets.conf.
|
|
|
|
# BIG_BLUE_BUTTON_URL = "https://bbb.example.com/bigbluebutton/"
|
|
|
|
|
|
|
|
|
2018-04-06 03:01:19 +02:00
|
|
|
################
|
2021-02-12 03:18:36 +01:00
|
|
|
## Miscellaneous settings.
|
|
|
|
|
2023-06-06 17:11:41 +02:00
|
|
|
## If you host multiple organizations on the same Zulip server, you
|
|
|
|
## can customize the hostname that one of them uses by adding it here.
|
|
|
|
## See https://zulip.readthedocs.io/en/latest/production/multiple-organizations.html#other-hostnames
|
|
|
|
## Note that you still need SSL certificates for this other custom hostname:
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/multiple-organizations.html#ssl-certificates
|
|
|
|
# REALM_HOSTS = {
|
|
|
|
# "example": "hostname.example.com",
|
|
|
|
# }
|
|
|
|
|
2021-05-05 09:22:41 +02:00
|
|
|
## How long outgoing webhook requests time out after
|
|
|
|
# OUTGOING_WEBHOOK_TIMEOUT_SECONDS = 10
|
|
|
|
|
2024-07-16 22:52:01 +02:00
|
|
|
## Mobile push notifications require registering for the Zulip mobile
|
|
|
|
## push notification service and configuring your server to use the
|
|
|
|
## service here. For complete documentation, see:
|
|
|
|
##
|
|
|
|
## https://zulip.readthedocs.io/en/stable/production/mobile-push-notifications.html
|
|
|
|
##
|
|
|
|
# ZULIP_SERVICE_PUSH_NOTIFICATIONS = True
|
|
|
|
|
|
|
|
## By default, a Zulip server that has registered for Zulip services
|
|
|
|
## submits both basic metadata (required for billing/free plan
|
|
|
|
## eligiblity) as well as aggregate usage statistics. You can disable
|
|
|
|
## submitting usage statistics here.
|
|
|
|
# ZULIP_SERVICE_SUBMIT_USAGE_STATISTICS = False
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## Whether to redact the content of push notifications. This is less
|
|
|
|
## usable, but avoids sending message content over the wire. In the
|
|
|
|
## future, we're likely to replace this with an end-to-end push
|
|
|
|
## notification encryption feature.
|
|
|
|
# PUSH_NOTIFICATION_REDACT_CONTENT = False
|
|
|
|
|
2021-03-05 18:39:02 +01:00
|
|
|
## Whether to lightly advertise sponsoring Zulip in the gear menu.
|
|
|
|
# PROMOTE_SPONSORING_ZULIP = True
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Controls whether session cookies expire when the browser closes
|
2013-11-14 05:14:18 +01:00
|
|
|
SESSION_EXPIRE_AT_BROWSER_CLOSE = False
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Session cookie expiry in seconds after the last page load
|
2017-07-09 01:54:38 +02:00
|
|
|
SESSION_COOKIE_AGE = 60 * 60 * 24 * 7 * 2 # 2 weeks
|
2013-11-14 05:14:18 +01:00
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Password strength requirements; learn about configuration at
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/security-model.html.
|
|
|
|
# PASSWORD_MIN_LENGTH = 6
|
|
|
|
# PASSWORD_MIN_GUESSES = 10000
|
|
|
|
|
|
|
|
## Controls whether Zulip sends "new login" email notifications.
|
|
|
|
# SEND_LOGIN_EMAILS = True
|
|
|
|
|
|
|
|
## Controls whether or not Zulip will parse links starting with
|
|
|
|
## "file:///" as a hyperlink (useful if you have e.g. an NFS share).
|
2016-03-10 17:17:40 +01:00
|
|
|
ENABLE_FILE_LINKS = False
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## By default, files uploaded by users and profile pictures are stored
|
|
|
|
## directly on the Zulip server. You can configure files being instead
|
|
|
|
## stored in Amazon S3 or another scalable data store here. See docs at:
|
|
|
|
##
|
|
|
|
## https://zulip.readthedocs.io/en/latest/production/upload-backends.html
|
|
|
|
##
|
|
|
|
## If you change LOCAL_UPLOADS_DIR to a different path, you will also
|
|
|
|
## need to manually edit Zulip's nginx configuration to use the new
|
|
|
|
## path. For that reason, we recommend replacing /home/zulip/uploads
|
|
|
|
## with a symlink instead of changing LOCAL_UPLOADS_DIR.
|
2016-09-02 21:27:35 +02:00
|
|
|
LOCAL_UPLOADS_DIR = "/home/zulip/uploads"
|
2021-02-12 03:18:36 +01:00
|
|
|
# S3_AUTH_UPLOADS_BUCKET = ""
|
|
|
|
# S3_AVATAR_BUCKET = ""
|
|
|
|
# S3_REGION = None
|
|
|
|
# S3_ENDPOINT_URL = None
|
2024-06-18 19:19:17 +02:00
|
|
|
# S3_AVATAR_PUBLIC_URL_PREFIX = None
|
2024-01-03 21:27:53 +01:00
|
|
|
# S3_ADDRESSING_STYLE = "auto"
|
2022-03-23 21:47:53 +01:00
|
|
|
# S3_SKIP_PROXY = True
|
2023-07-19 04:27:03 +02:00
|
|
|
# S3_UPLOADS_STORAGE_CLASS = "STANDARD"
|
2021-02-12 03:18:36 +01:00
|
|
|
|
|
|
|
## Maximum allowed size of uploaded files, in megabytes. This value is
|
|
|
|
## capped at 80MB in the nginx configuration, because the file upload
|
|
|
|
## implementation doesn't use chunked uploads, and browsers may crash
|
|
|
|
## with larger uploads.
|
|
|
|
## Set MAX_FILE_UPLOAD_SIZE to 0 to disable file uploads completely
|
|
|
|
## (including hiding upload-related options from UI).
|
2015-11-21 04:08:53 +01:00
|
|
|
MAX_FILE_UPLOAD_SIZE = 25
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Controls whether name changes are completely disabled for this
|
|
|
|
## installation. This is useful when you're syncing names from an
|
|
|
|
## integrated LDAP/Active Directory.
|
2013-11-15 16:52:31 +01:00
|
|
|
NAME_CHANGES_DISABLED = False
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Controls whether avatar changes are completely disabled for this
|
|
|
|
## installation. This is useful when you're syncing avatars from an
|
|
|
|
## integrated LDAP/Active Directory.
|
2019-04-29 08:41:00 +02:00
|
|
|
AVATAR_CHANGES_DISABLED = False
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Controls whether users who have not uploaded an avatar will receive an avatar
|
|
|
|
## from gravatar.com.
|
2013-11-15 22:25:02 +01:00
|
|
|
ENABLE_GRAVATAR = True
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## To override the default avatar image if ENABLE_GRAVATAR is False, place your
|
|
|
|
## custom default avatar image at /home/zulip/local-static/default-avatar.png
|
|
|
|
## and uncomment the following line.
|
2022-04-28 20:55:34 +02:00
|
|
|
# DEFAULT_AVATAR_URI = "/local-static/default-avatar.png"
|
2021-02-12 03:18:36 +01:00
|
|
|
|
2022-04-28 20:55:34 +02:00
|
|
|
## The default CAMO_URI of "/external_content/" is served by the camo
|
2021-02-12 03:18:36 +01:00
|
|
|
## setup in the default Zulip nginx configuration. Setting CAMO_URI
|
2022-04-28 20:55:34 +02:00
|
|
|
## to "" will disable the Camo integration.
|
2021-02-12 08:20:45 +01:00
|
|
|
CAMO_URI = "/external_content/"
|
2021-02-05 07:55:52 +01:00
|
|
|
|
2024-05-10 15:37:43 +02:00
|
|
|
## Controls various features explaining Zulip to new users. Disabling
|
|
|
|
## this is only recommended for installations that are using a limited
|
|
|
|
## subset of the Zulip UI, such as embedding it in a larger app.
|
2021-03-11 17:19:49 +01:00
|
|
|
# TUTORIAL_ENABLED = True
|
|
|
|
|
2021-02-12 03:18:36 +01:00
|
|
|
## Controls whether Zulip will rate-limit user requests.
|
|
|
|
# RATE_LIMITING = True
|
|
|
|
|
2022-11-05 23:55:11 +01:00
|
|
|
## Entries in this dictionary will override Zulip's default rate
|
|
|
|
## limits. Rules which are not explicitly overridden here
|
|
|
|
## will be as default. View the current rules using:
|
|
|
|
## /home/zulip/deployments/current/scripts/get-django-setting RATE_LIMITING_RULES
|
|
|
|
##
|
|
|
|
## The limits are tuples of a number of seconds and a number of
|
|
|
|
## requests allowed over that many seconds. If multiple tuples are
|
|
|
|
## given in a rule, a request breaching any of them will trigger a
|
|
|
|
## rate-limited response to the client. For example, to change the
|
|
|
|
## limits for total API requests by each user to be at most 100
|
|
|
|
## requests per minute, and at most 200 requests per hour, add:
|
|
|
|
## "api_by_user": [(60, 100), (3600, 200)],
|
|
|
|
# RATE_LIMITING_RULES = {
|
|
|
|
# "api_by_ip": [
|
|
|
|
# (60, 100),
|
|
|
|
# ],
|
|
|
|
# }
|
|
|
|
|
rate_limit: Add a flag to lump all TOR exit node IPs together.
TOR users are legitimate users of the system; however, that system can
also be used for abuse -- specifically, by evading IP-based
rate-limiting.
For the purposes of IP-based rate-limiting, add a
RATE_LIMIT_TOR_TOGETHER flag, defaulting to false, which lumps all
requests from TOR exit nodes into the same bucket. This may allow a
TOR user to deny other TOR users access to the find-my-account and
new-realm endpoints, but this is a low cost for cutting off a
significant potential abuse vector.
If enabled, the list of TOR exit nodes is fetched from their public
endpoint once per hour, via a cron job, and cached on disk. Django
processes load this data from disk, and cache it in memcached.
Requests are spared from the burden of checking disk on failure via a
circuitbreaker, which trips of there are two failures in a row, and
only begins trying again after 10 minutes.
2021-11-03 21:43:02 +01:00
|
|
|
## Fetch TOR exit node list every hour, and group all TOR exit nodes
|
|
|
|
## together into one bucket when applying rate-limiting.
|
|
|
|
# RATE_LIMIT_TOR_TOGETHER = False
|
|
|
|
|
2021-11-03 21:36:54 +01:00
|
|
|
## Configuration for Terms of Service and Privacy Policy for the
|
|
|
|
## server. If unset, Zulip will never prompt users to accept Terms of
|
|
|
|
## Service. Users will be prompted to accept the terms during account
|
|
|
|
## registration, and during login if this value has changed.
|
|
|
|
# TERMS_OF_SERVICE_VERSION = "1.0"
|
|
|
|
|
|
|
|
## Directory containing Markdown files for the server's policies.
|
|
|
|
# POLICIES_DIRECTORY = "/etc/zulip/policies/"
|