2020-06-08 03:58:37 +02:00
import os
import sys
2020-06-11 00:54:34 +02:00
import time
2021-05-21 16:58:50 +02:00
import warnings
2020-06-11 00:54:34 +02:00
from copy import deepcopy
2020-09-15 01:35:44 +02:00
from typing import Any , Dict , List , Tuple , Union
2020-06-08 03:58:37 +02:00
from urllib . parse import urljoin
2021-05-21 16:58:50 +02:00
from cryptography . utils import CryptographyDeprecationWarning
2020-06-19 00:32:55 +02:00
from django . template . loaders import app_directories
2020-06-08 03:58:37 +02:00
import zerver . lib . logging_util
2020-09-15 02:01:33 +02:00
from scripts . lib . zulip_tools import get_tornado_ports
2020-06-11 00:54:34 +02:00
from zerver . lib . db import TimeTrackingConnection
2020-06-08 03:58:37 +02:00
2020-06-11 00:54:34 +02:00
from . config import (
DEPLOY_ROOT ,
DEVELOPMENT ,
PRODUCTION ,
2020-09-15 02:01:33 +02:00
config_file ,
2020-06-11 00:54:34 +02:00
get_config ,
get_from_file_if_exists ,
get_secret ,
)
2020-06-08 03:58:37 +02:00
from . configured_settings import (
ADMINS ,
ALLOWED_HOSTS ,
AUTH_LDAP_BIND_DN ,
AUTH_LDAP_CONNECTION_OPTIONS ,
AUTH_LDAP_SERVER_URI ,
2020-06-11 00:54:34 +02:00
AUTHENTICATION_BACKENDS ,
2020-06-08 03:58:37 +02:00
CAMO_URI ,
DEBUG ,
DEBUG_ERROR_REPORTING ,
EMAIL_BACKEND ,
EMAIL_HOST ,
ERROR_REPORTING ,
EXTERNAL_HOST ,
2020-06-27 02:37:49 +02:00
EXTERNAL_HOST_WITHOUT_PORT ,
2020-06-08 03:58:37 +02:00
EXTERNAL_URI_SCHEME ,
EXTRA_INSTALLED_APPS ,
GOOGLE_OAUTH2_CLIENT_ID ,
IS_DEV_DROPLET ,
LOCAL_UPLOADS_DIR ,
MEMCACHED_LOCATION ,
MEMCACHED_USERNAME ,
REALM_HOSTS ,
REGISTER_LINK_DISABLED ,
REMOTE_POSTGRES_HOST ,
REMOTE_POSTGRES_PORT ,
REMOTE_POSTGRES_SSLMODE ,
2021-08-23 15:14:05 +02:00
ROOT_SUBDOMAIN_ALIASES ,
2020-06-08 03:58:37 +02:00
SENDFILE_BACKEND ,
2020-07-02 02:20:55 +02:00
SENTRY_DSN ,
2020-06-26 12:22:48 +02:00
SOCIAL_AUTH_APPLE_APP_ID ,
2020-06-08 03:58:37 +02:00
SOCIAL_AUTH_APPLE_SERVICES_ID ,
SOCIAL_AUTH_GITHUB_KEY ,
SOCIAL_AUTH_GITHUB_ORG_NAME ,
SOCIAL_AUTH_GITHUB_TEAM_ID ,
SOCIAL_AUTH_GOOGLE_KEY ,
SOCIAL_AUTH_SAML_ENABLED_IDPS ,
SOCIAL_AUTH_SAML_SECURITY_CONFIG ,
2021-08-23 15:14:05 +02:00
SOCIAL_AUTH_SUBDOMAIN ,
2020-06-08 03:58:37 +02:00
STATSD_HOST ,
2020-09-17 00:30:45 +02:00
TORNADO_PORTS ,
2020-06-08 03:58:37 +02:00
USING_PGROONGA ,
ZULIP_ADMINISTRATOR ,
)
########################################################################
# INITIAL SETTINGS
########################################################################
# Make this unique, and don't share it with anybody.
SECRET_KEY = get_secret ( " secret_key " )
# A shared secret, used to authenticate different parts of the app to each other.
SHARED_SECRET = get_secret ( " shared_secret " )
# We use this salt to hash a user's email into a filename for their user-uploaded
# avatar. If this salt is discovered, attackers will only be able to determine
# that the owner of an email account has uploaded an avatar to Zulip, which isn't
# the end of the world. Don't use the salt where there is more security exposure.
AVATAR_SALT = get_secret ( " avatar_salt " )
# SERVER_GENERATION is used to track whether the server has been
# restarted for triggering browser clients to reload.
SERVER_GENERATION = int ( time . time ( ) )
# Key to authenticate this server to zulip.org for push notifications, etc.
ZULIP_ORG_KEY = get_secret ( " zulip_org_key " )
ZULIP_ORG_ID = get_secret ( " zulip_org_id " )
if DEBUG :
2021-02-12 08:20:45 +01:00
INTERNAL_IPS = ( " 127.0.0.1 " , )
2020-06-08 03:58:37 +02:00
# Detect whether we're running as a queue worker; this impacts the logging configuration.
2021-02-12 08:20:45 +01:00
if len ( sys . argv ) > 2 and sys . argv [ 0 ] . endswith ( " manage.py " ) and sys . argv [ 1 ] == " process_queue " :
2020-06-08 03:58:37 +02:00
IS_WORKER = True
else :
IS_WORKER = False
# This is overridden in test_settings.py for the test suites
TEST_SUITE = False
# This is overridden in test_settings.py for the test suites
2020-09-05 15:37:07 +02:00
PUPPETEER_TESTS = False
2020-06-08 03:58:37 +02:00
# This is overridden in test_settings.py for the test suites
RUNNING_OPENAPI_CURL_TEST = False
# This is overridden in test_settings.py for the test suites
GENERATE_STRIPE_FIXTURES = False
2020-08-19 12:40:10 +02:00
# This is overridden in test_settings.py for the test suites
BAN_CONSOLE_OUTPUT = False
2020-06-08 03:58:37 +02:00
# These are the settings that we will check that the user has filled in for
# production deployments before starting the app. It consists of a series
# of pairs of (setting name, default value that it must be changed from)
2021-02-12 08:19:30 +01:00
REQUIRED_SETTINGS = [
( " EXTERNAL_HOST " , " zulip.example.com " ) ,
( " ZULIP_ADMINISTRATOR " , " zulip-admin@example.com " ) ,
# SECRET_KEY doesn't really need to be here, in
# that we set it automatically, but just in
# case, it seems worth having in this list
( " SECRET_KEY " , " " ) ,
( " AUTHENTICATION_BACKENDS " , ( ) ) ,
]
2020-06-08 03:58:37 +02:00
MANAGERS = ADMINS
########################################################################
# STANDARD DJANGO SETTINGS
########################################################################
# Local time zone for this installation. Choices can be found here:
# https://en.wikipedia.org/wiki/List_of_tz_zones_by_name
# although not all choices may be available on all operating systems.
# In a Windows environment this must be set to your system time zone.
2021-02-12 08:20:45 +01:00
TIME_ZONE = " UTC "
2020-06-08 03:58:37 +02:00
# Language code for this installation. All choices can be found here:
# http://www.i18nguy.com/unicode/language-identifiers.html
2021-02-12 08:20:45 +01:00
LANGUAGE_CODE = " en-us "
2020-06-08 03:58:37 +02:00
# If you set this to False, Django will make some optimizations so as not
# to load the internationalization machinery.
USE_I18N = True
# If you set this to False, Django will not format dates, numbers and
# calendars according to the current locale.
USE_L10N = True
# If you set this to False, Django will not use timezone-aware datetimes.
USE_TZ = True
# this directory will be used to store logs for development environment
2021-02-12 08:20:45 +01:00
DEVELOPMENT_LOG_DIRECTORY = os . path . join ( DEPLOY_ROOT , " var " , " log " )
2020-06-08 03:58:37 +02:00
# Make redirects work properly behind a reverse proxy
USE_X_FORWARDED_HOST = True
# Extend ALLOWED_HOSTS with localhost (needed to RPC to Tornado),
2021-02-12 08:20:45 +01:00
ALLOWED_HOSTS + = [ " 127.0.0.1 " , " localhost " ]
2020-06-08 03:58:37 +02:00
# ... with hosts corresponding to EXTERNAL_HOST,
2020-06-27 02:37:49 +02:00
ALLOWED_HOSTS + = [ EXTERNAL_HOST_WITHOUT_PORT , " . " + EXTERNAL_HOST_WITHOUT_PORT ]
2020-06-08 03:58:37 +02:00
# ... and with the hosts in REALM_HOSTS.
ALLOWED_HOSTS + = REALM_HOSTS . values ( )
2020-06-11 00:54:34 +02:00
2020-06-08 03:58:37 +02:00
class TwoFactorLoader ( app_directories . Loader ) :
2021-08-15 18:32:51 +02:00
def get_dirs ( self ) - > List [ Union [ bytes , str ] ] :
2020-06-08 03:58:37 +02:00
dirs = super ( ) . get_dirs ( )
2021-01-12 18:51:58 +01:00
return [ d for d in dirs if d . match ( " two_factor/* " ) ]
2020-06-08 03:58:37 +02:00
2021-02-12 08:19:30 +01:00
2020-06-08 03:58:37 +02:00
MIDDLEWARE = (
# With the exception of it's dependencies,
# our logging middleware should be the top middleware item.
2021-02-12 08:20:45 +01:00
" zerver.middleware.TagRequests " ,
middleware: Do not trust X-Forwarded-For; use X-Real-Ip, set from nginx.
The `X-Forwarded-For` header is a list of proxies' IP addresses; each
proxy appends the remote address of the host it received its request
from to the list, as it passes the request down. A naïve parsing, as
SetRemoteAddrFromForwardedFor did, would thus interpret the first
address in the list as the client's IP.
However, clients can pass in arbitrary `X-Forwarded-For` headers,
which would allow them to spoof their IP address. `nginx`'s behavior
is to treat the addresses as untrusted unless they match an allowlist
of known proxies. By setting `real_ip_recursive on`, it also allows
this behavior to be applied repeatedly, moving from right to left down
the `X-Forwarded-For` list, stopping at the right-most that is
untrusted.
Rather than re-implement this logic in Django, pass the first
untrusted value that `nginx` computer down into Django via `X-Real-Ip`
header. This allows consistent IP addresses in logs between `nginx`
and Django.
Proxied calls into Tornado (which don't use UWSGI) already passed this
header, as Tornado logging respects it.
2021-03-23 22:40:08 +01:00
" zerver.middleware.SetRemoteAddrFromRealIpHeader " ,
2021-02-12 08:20:45 +01:00
" zerver.middleware.RequestContext " ,
" zerver.middleware.LogRequests " ,
" zerver.middleware.JsonErrorHandler " ,
" zerver.middleware.RateLimitMiddleware " ,
" zerver.middleware.FlushDisplayRecipientCache " ,
" zerver.middleware.ZulipCommonMiddleware " ,
" django.contrib.sessions.middleware.SessionMiddleware " ,
" zerver.middleware.LocaleMiddleware " ,
" zerver.middleware.HostDomainMiddleware " ,
" django.middleware.csrf.CsrfViewMiddleware " ,
" django.contrib.auth.middleware.AuthenticationMiddleware " ,
2021-09-10 18:36:56 +02:00
" zerver.middleware.ZulipSCIMAuthCheckMiddleware " ,
2020-06-08 03:58:37 +02:00
# Make sure 2FA middlewares come after authentication middleware.
2021-02-12 08:20:45 +01:00
" django_otp.middleware.OTPMiddleware " , # Required by two factor auth.
" two_factor.middleware.threadlocals.ThreadLocals " , # Required by Twilio
2020-06-08 03:58:37 +02:00
# Needs to be after CommonMiddleware, which sets Content-Length
2021-02-12 08:20:45 +01:00
" zerver.middleware.FinalizeOpenGraphDescription " ,
2020-06-08 03:58:37 +02:00
)
AUTH_USER_MODEL = " zerver.UserProfile "
2021-02-12 08:20:45 +01:00
TEST_RUNNER = " zerver.lib.test_runner.Runner "
2020-06-08 03:58:37 +02:00
2021-02-12 08:20:45 +01:00
ROOT_URLCONF = " zproject.urls "
2020-06-08 03:58:37 +02:00
# Python dotted path to the WSGI application used by Django's runserver.
2021-02-12 08:20:45 +01:00
WSGI_APPLICATION = " zproject.wsgi.application "
2020-06-08 03:58:37 +02:00
# A site can include additional installed apps via the
# EXTRA_INSTALLED_APPS setting
INSTALLED_APPS = [
2021-02-12 08:20:45 +01:00
" django.contrib.auth " ,
" django.contrib.contenttypes " ,
" django.contrib.sessions " ,
" django.contrib.staticfiles " ,
" confirmation " ,
" zerver " ,
" social_django " ,
2021-09-10 18:36:56 +02:00
" django_scim " ,
2020-06-08 03:58:37 +02:00
# 2FA related apps.
2021-02-12 08:20:45 +01:00
" django_otp " ,
" django_otp.plugins.otp_static " ,
" django_otp.plugins.otp_totp " ,
" two_factor " ,
2020-06-08 03:58:37 +02:00
]
if USING_PGROONGA :
2021-02-12 08:20:45 +01:00
INSTALLED_APPS + = [ " pgroonga " ]
2020-06-08 03:58:37 +02:00
INSTALLED_APPS + = EXTRA_INSTALLED_APPS
2021-02-12 08:20:45 +01:00
ZILENCER_ENABLED = " zilencer " in INSTALLED_APPS
CORPORATE_ENABLED = " corporate " in INSTALLED_APPS
2020-06-08 03:58:37 +02:00
2020-09-17 00:30:45 +02:00
if not TORNADO_PORTS :
TORNADO_PORTS = get_tornado_ports ( config_file )
2020-09-15 02:01:33 +02:00
TORNADO_PROCESSES = len ( TORNADO_PORTS )
2020-06-08 03:58:37 +02:00
RUNNING_INSIDE_TORNADO = False
AUTORELOAD = DEBUG
SILENCED_SYSTEM_CHECKS = [
# auth.W004 checks that the UserProfile field named by USERNAME_FIELD has
# `unique=True`. For us this is `email`, and it's unique only per-realm.
# Per Django docs, this is perfectly fine so long as our authentication
# backends support the username not being unique; and they do.
# See: https://docs.djangoproject.com/en/2.2/topics/auth/customizing/#django.contrib.auth.models.CustomUser.USERNAME_FIELD
" auth.W004 " ,
2021-02-14 00:03:40 +01:00
# models.E034 limits index names to 30 characters for Oracle compatibility.
# We aren't using Oracle.
" models.E034 " ,
2020-06-08 03:58:37 +02:00
]
########################################################################
# DATABASE CONFIGURATION
########################################################################
# Zulip's Django configuration supports 4 different ways to do
2020-10-26 22:27:53 +01:00
# PostgreSQL authentication:
2020-06-08 03:58:37 +02:00
#
# * The development environment uses the `local_database_password`
# secret from `zulip-secrets.conf` to authenticate with a local
# database. The password is automatically generated and managed by
# `generate_secrets.py` during or provision.
#
# The remaining 3 options are for production use:
#
2020-10-26 22:27:53 +01:00
# * Using PostgreSQL's "peer" authentication to authenticate to a
2020-06-08 03:58:37 +02:00
# database on the local system using one's user ID (processes
# running as user `zulip` on the system are automatically
# authenticated as database user `zulip`). This is the default in
# production. We don't use this in the development environment,
# because it requires the developer's user to be called `zulip`.
#
2020-10-26 22:27:53 +01:00
# * Using password authentication with a remote PostgreSQL server using
2020-06-08 03:58:37 +02:00
# the `REMOTE_POSTGRES_HOST` setting and the password from the
# `postgres_password` secret.
#
2020-10-26 22:27:53 +01:00
# * Using passwordless authentication with a remote PostgreSQL server
2020-06-08 03:58:37 +02:00
# using the `REMOTE_POSTGRES_HOST` setting and a client certificate
# under `/home/zulip/.postgresql/`.
#
# We implement these options with a default DATABASES configuration
# supporting peer authentication, with logic to override it as
# appropriate if DEVELOPMENT or REMOTE_POSTGRES_HOST is set.
2021-02-12 08:19:30 +01:00
DATABASES : Dict [ str , Dict [ str , Any ] ] = {
" default " : {
2021-02-12 08:20:45 +01:00
" ENGINE " : " django.db.backends.postgresql " ,
2021-05-25 05:46:09 +02:00
" NAME " : get_config ( " postgresql " , " database_name " , " zulip " ) ,
" USER " : get_config ( " postgresql " , " database_user " , " zulip " ) ,
2021-02-12 08:19:30 +01:00
# Password = '' => peer/certificate authentication (no password)
2021-02-12 08:20:45 +01:00
" PASSWORD " : " " ,
2021-02-12 08:19:30 +01:00
# Host = '' => connect to localhost by default
2021-02-12 08:20:45 +01:00
" HOST " : " " ,
" SCHEMA " : " zulip " ,
" CONN_MAX_AGE " : 600 ,
" OPTIONS " : {
" connection_factory " : TimeTrackingConnection ,
2021-02-12 08:19:30 +01:00
} ,
}
}
2020-06-08 03:58:37 +02:00
if DEVELOPMENT :
LOCAL_DATABASE_PASSWORD = get_secret ( " local_database_password " )
2020-09-03 05:32:15 +02:00
DATABASES [ " default " ] . update (
PASSWORD = LOCAL_DATABASE_PASSWORD ,
2021-02-12 08:20:45 +01:00
HOST = " localhost " ,
2020-09-03 05:32:15 +02:00
)
2021-02-12 08:20:45 +01:00
elif REMOTE_POSTGRES_HOST != " " :
DATABASES [ " default " ] . update (
2020-09-03 05:32:15 +02:00
HOST = REMOTE_POSTGRES_HOST ,
PORT = REMOTE_POSTGRES_PORT ,
)
2020-06-08 03:58:37 +02:00
if get_secret ( " postgres_password " ) is not None :
2021-02-12 08:20:45 +01:00
DATABASES [ " default " ] . update (
2020-09-03 05:32:15 +02:00
PASSWORD = get_secret ( " postgres_password " ) ,
)
2021-02-12 08:20:45 +01:00
if REMOTE_POSTGRES_SSLMODE != " " :
DATABASES [ " default " ] [ " OPTIONS " ] [ " sslmode " ] = REMOTE_POSTGRES_SSLMODE
2020-06-08 03:58:37 +02:00
else :
2021-02-12 08:20:45 +01:00
DATABASES [ " default " ] [ " OPTIONS " ] [ " sslmode " ] = " verify-full "
2021-05-25 05:46:09 +02:00
elif get_config ( " postgresql " , " database_user " ) != " zulip " :
if get_secret ( " postgres_password " ) is not None :
DATABASES [ " default " ] . update (
PASSWORD = get_secret ( " postgres_password " ) ,
HOST = " localhost " ,
)
2021-02-12 08:20:45 +01:00
POSTGRESQL_MISSING_DICTIONARIES = bool ( get_config ( " postgresql " , " missing_dictionaries " , None ) )
2020-06-08 03:58:37 +02:00
2021-05-01 15:34:59 +02:00
DEFAULT_AUTO_FIELD = " django.db.models.AutoField "
2020-06-08 03:58:37 +02:00
########################################################################
# RABBITMQ CONFIGURATION
########################################################################
USING_RABBITMQ = True
RABBITMQ_PASSWORD = get_secret ( " rabbitmq_password " )
########################################################################
# CACHING CONFIGURATION
########################################################################
SESSION_ENGINE = " django.contrib.sessions.backends.cached_db "
MEMCACHED_PASSWORD = get_secret ( " memcached_password " )
CACHES = {
2021-02-12 08:20:45 +01:00
" default " : {
" BACKEND " : " django_bmemcached.memcached.BMemcached " ,
" LOCATION " : MEMCACHED_LOCATION ,
" OPTIONS " : {
" socket_timeout " : 3600 ,
" username " : MEMCACHED_USERNAME ,
" password " : MEMCACHED_PASSWORD ,
" pickle_protocol " : 4 ,
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
} ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" database " : {
" BACKEND " : " django.core.cache.backends.db.DatabaseCache " ,
" LOCATION " : " third_party_api_results " ,
2020-06-08 03:58:37 +02:00
# This cache shouldn't timeout; we're really just using the
# cache API to store the results of requests to third-party
# APIs like the Twitter API permanently.
2021-02-12 08:20:45 +01:00
" TIMEOUT " : None ,
" OPTIONS " : {
" MAX_ENTRIES " : 100000000 ,
" CULL_FREQUENCY " : 10 ,
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
} ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" in-memory " : {
" BACKEND " : " django.core.cache.backends.locmem.LocMemCache " ,
2020-06-08 03:58:37 +02:00
} ,
}
########################################################################
# REDIS-BASED RATE LIMITING CONFIGURATION
########################################################################
RATE_LIMITING_RULES = {
2021-02-12 08:20:45 +01:00
" api_by_user " : [
2020-06-08 03:58:37 +02:00
( 60 , 200 ) , # 200 requests max every minute
] ,
2021-07-08 14:46:47 +02:00
" api_by_ip " : [
( 60 , 100 ) ,
] ,
2021-07-08 14:46:47 +02:00
" api_by_remote_server " : [
( 60 , 1000 ) ,
] ,
2021-02-12 08:20:45 +01:00
" authenticate_by_username " : [
2020-06-08 03:58:37 +02:00
( 1800 , 5 ) , # 5 login attempts within 30 minutes
] ,
2021-11-03 23:20:55 +01:00
" email_change_by_user " : [
( 3600 , 2 ) , # 2 per hour
( 86400 , 5 ) , # 5 per day
] ,
2021-02-12 08:20:45 +01:00
" password_reset_form_by_email " : [
2020-06-08 03:58:37 +02:00
( 3600 , 2 ) , # 2 reset emails per hour
( 86400 , 5 ) , # 5 per day
] ,
2021-11-03 21:40:28 +01:00
" sends_email_by_ip " : [
2021-11-05 21:10:05 +01:00
( 86400 , 5 ) ,
2021-11-03 21:40:28 +01:00
] ,
2020-06-08 03:58:37 +02:00
}
# List of domains that, when applied to a request in a Tornado process,
# will be handled with the separate in-memory rate limiting backend for Tornado,
# which has its own buckets separate from the default backend.
# In principle, it should be impossible to make requests to tornado that fall into
# other domains, but we use this list as an extra precaution.
2021-07-08 14:46:47 +02:00
RATE_LIMITING_DOMAINS_FOR_TORNADO = [ " api_by_user " , " api_by_ip " ]
2020-06-08 03:58:37 +02:00
2021-02-27 08:19:13 +01:00
# These ratelimits are also documented publicly at
# https://zulip.readthedocs.io/en/latest/production/email-gateway.html
2020-06-08 03:58:37 +02:00
RATE_LIMITING_MIRROR_REALM_RULES = [
( 60 , 50 ) , # 50 emails per minute
( 300 , 120 ) , # 120 emails per 5 minutes
( 3600 , 600 ) , # 600 emails per hour
]
DEBUG_RATE_LIMITING = DEBUG
2021-02-12 08:20:45 +01:00
REDIS_PASSWORD = get_secret ( " redis_password " )
2020-06-08 03:58:37 +02:00
########################################################################
# SECURITY SETTINGS
########################################################################
# Tell the browser to never send our cookies without encryption, e.g.
# when executing the initial http -> https redirect.
#
# Turn it off for local testing because we don't have SSL.
if PRODUCTION :
SESSION_COOKIE_SECURE = True
CSRF_COOKIE_SECURE = True
# https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-05#section-4.1.3.2
SESSION_COOKIE_NAME = " __Host-sessionid "
CSRF_COOKIE_NAME = " __Host-csrftoken "
2020-10-23 02:43:28 +02:00
# Prevent JavaScript from reading the CSRF token from cookies. Our code gets
2020-06-08 03:58:37 +02:00
# the token from the DOM, which means malicious code could too. But hiding the
# cookie will slow down some attackers.
CSRF_COOKIE_HTTPONLY = True
2021-02-12 08:20:45 +01:00
CSRF_FAILURE_VIEW = " zerver.middleware.csrf_failure "
2020-06-08 03:58:37 +02:00
if DEVELOPMENT :
# Use fast password hashing for creating testing users when not
# PRODUCTION. Saves a bunch of time.
PASSWORD_HASHERS = (
2021-02-12 08:20:45 +01:00
" django.contrib.auth.hashers.SHA1PasswordHasher " ,
" django.contrib.auth.hashers.PBKDF2PasswordHasher " ,
2020-06-08 03:58:37 +02:00
)
# Also we auto-generate passwords for the default users which you
# can query using ./manage.py print_initial_password
INITIAL_PASSWORD_SALT = get_secret ( " initial_password_salt " )
else :
# For production, use the best password hashing algorithm: Argon2
# Zulip was originally on PBKDF2 so we need it for compatibility
2021-02-12 08:19:30 +01:00
PASSWORD_HASHERS = (
2021-02-12 08:20:45 +01:00
" django.contrib.auth.hashers.Argon2PasswordHasher " ,
" django.contrib.auth.hashers.PBKDF2PasswordHasher " ,
2021-02-12 08:19:30 +01:00
)
2020-06-08 03:58:37 +02:00
########################################################################
# API/BOT SETTINGS
########################################################################
ROOT_DOMAIN_URI = EXTERNAL_URI_SCHEME + EXTERNAL_HOST
S3_KEY = get_secret ( " s3_key " )
S3_SECRET_KEY = get_secret ( " s3_secret_key " )
if LOCAL_UPLOADS_DIR is not None :
if SENDFILE_BACKEND is None :
2021-02-12 08:20:45 +01:00
SENDFILE_BACKEND = " django_sendfile.backends.nginx "
2020-06-08 03:58:37 +02:00
SENDFILE_ROOT = os . path . join ( LOCAL_UPLOADS_DIR , " files " )
2021-02-12 08:20:45 +01:00
SENDFILE_URL = " /serve_uploads "
2020-06-08 03:58:37 +02:00
# GCM tokens are IP-whitelisted; if we deploy to additional
# servers you will need to explicitly add their IPs here:
# https://cloud.google.com/console/project/apps~zulip-android/apiui/credential
ANDROID_GCM_API_KEY = get_secret ( " android_gcm_api_key " )
DROPBOX_APP_KEY = get_secret ( " dropbox_app_key " )
2021-02-12 08:20:45 +01:00
BIG_BLUE_BUTTON_SECRET = get_secret ( " big_blue_button_secret " )
2020-04-27 22:41:31 +02:00
2020-06-08 03:58:37 +02:00
# Twitter API credentials
# Secrecy not required because its only used for R/O requests.
# Please don't make us go over our rate limit.
TWITTER_CONSUMER_KEY = get_secret ( " twitter_consumer_key " )
TWITTER_CONSUMER_SECRET = get_secret ( " twitter_consumer_secret " )
TWITTER_ACCESS_TOKEN_KEY = get_secret ( " twitter_access_token_key " )
TWITTER_ACCESS_TOKEN_SECRET = get_secret ( " twitter_access_token_secret " )
# These are the bots that Zulip sends automated messages as.
2021-02-12 08:19:30 +01:00
INTERNAL_BOTS = [
{
2021-02-12 08:20:45 +01:00
" var_name " : " NOTIFICATION_BOT " ,
" email_template " : " notification-bot@ %s " ,
" name " : " Notification Bot " ,
2021-02-12 08:19:30 +01:00
} ,
{
2021-02-12 08:20:45 +01:00
" var_name " : " EMAIL_GATEWAY_BOT " ,
" email_template " : " emailgateway@ %s " ,
" name " : " Email Gateway " ,
2021-02-12 08:19:30 +01:00
} ,
{
2021-02-12 08:20:45 +01:00
" var_name " : " NAGIOS_SEND_BOT " ,
" email_template " : " nagios-send-bot@ %s " ,
" name " : " Nagios Send Bot " ,
2021-02-12 08:19:30 +01:00
} ,
{
2021-02-12 08:20:45 +01:00
" var_name " : " NAGIOS_RECEIVE_BOT " ,
" email_template " : " nagios-receive-bot@ %s " ,
" name " : " Nagios Receive Bot " ,
2021-02-12 08:19:30 +01:00
} ,
{
2021-02-12 08:20:45 +01:00
" var_name " : " WELCOME_BOT " ,
" email_template " : " welcome-bot@ %s " ,
" name " : " Welcome Bot " ,
2021-02-12 08:19:30 +01:00
} ,
]
2020-06-08 03:58:37 +02:00
# Bots that are created for each realm like the reminder-bot goes here.
REALM_INTERNAL_BOTS : List [ Dict [ str , str ] ] = [ ]
# These are realm-internal bots that may exist in some organizations,
# so configure power the setting, but should not be auto-created at this time.
DISABLED_REALM_INTERNAL_BOTS = [
2021-02-12 08:19:30 +01:00
{
2021-02-12 08:20:45 +01:00
" var_name " : " REMINDER_BOT " ,
" email_template " : " reminder-bot@ %s " ,
" name " : " Reminder Bot " ,
2021-02-12 08:19:30 +01:00
} ,
2020-06-08 03:58:37 +02:00
]
if PRODUCTION :
INTERNAL_BOTS + = [
2021-02-12 08:19:30 +01:00
{
2021-02-12 08:20:45 +01:00
" var_name " : " NAGIOS_STAGING_SEND_BOT " ,
" email_template " : " nagios-staging-send-bot@ %s " ,
" name " : " Nagios Staging Send Bot " ,
2021-02-12 08:19:30 +01:00
} ,
{
2021-02-12 08:20:45 +01:00
" var_name " : " NAGIOS_STAGING_RECEIVE_BOT " ,
" email_template " : " nagios-staging-receive-bot@ %s " ,
" name " : " Nagios Staging Receive Bot " ,
2021-02-12 08:19:30 +01:00
} ,
2020-06-08 03:58:37 +02:00
]
INTERNAL_BOT_DOMAIN = " zulip.com "
########################################################################
# STATSD CONFIGURATION
########################################################################
# Statsd is not super well supported; if you want to use it you'll need
# to set STATSD_HOST and STATSD_PREFIX.
2021-02-12 08:20:45 +01:00
if STATSD_HOST != " " :
INSTALLED_APPS + = [ " django_statsd " ]
2020-06-08 03:58:37 +02:00
STATSD_PORT = 8125
2021-02-12 08:20:45 +01:00
STATSD_CLIENT = " django_statsd.clients.normal "
2020-06-08 03:58:37 +02:00
########################################################################
# CAMO HTTPS CACHE CONFIGURATION
########################################################################
2021-02-12 08:20:45 +01:00
if CAMO_URI != " " :
2020-06-08 03:58:37 +02:00
# This needs to be synced with the Camo installation
CAMO_KEY = get_secret ( " camo_key " )
########################################################################
# STATIC CONTENT AND MINIFICATION SETTINGS
########################################################################
2021-02-12 08:20:45 +01:00
if PRODUCTION or IS_DEV_DROPLET or os . getenv ( " EXTERNAL_HOST " ) is not None :
STATIC_URL = urljoin ( ROOT_DOMAIN_URI , " /static/ " )
2020-06-08 03:58:37 +02:00
else :
2021-02-12 08:20:45 +01:00
STATIC_URL = " http://localhost:9991/static/ "
2020-06-08 03:58:37 +02:00
# ZulipStorage is a modified version of ManifestStaticFilesStorage,
# and, like that class, it inserts a file hash into filenames
# to prevent the browser from using stale files from cache.
#
# Unlike PipelineStorage, it requires the files to exist in
# STATIC_ROOT even for dev servers. So we only use
# ZulipStorage when not DEBUG.
if not DEBUG :
2021-02-12 08:20:45 +01:00
STATICFILES_STORAGE = " zerver.lib.storage.ZulipStorage "
2020-06-08 03:58:37 +02:00
if PRODUCTION :
2021-02-12 08:20:45 +01:00
STATIC_ROOT = " /home/zulip/prod-static "
2020-06-08 03:58:37 +02:00
else :
2021-02-12 08:20:45 +01:00
STATIC_ROOT = os . path . abspath ( os . path . join ( DEPLOY_ROOT , " prod-static/serve " ) )
2020-06-08 03:58:37 +02:00
# If changing this, you need to also the hack modifications to this in
# our compilemessages management command.
2021-02-12 08:20:45 +01:00
LOCALE_PATHS = ( os . path . join ( DEPLOY_ROOT , " locale " ) , )
2020-06-08 03:58:37 +02:00
# We want all temporary uploaded files to be stored on disk.
FILE_UPLOAD_MAX_MEMORY_SIZE = 0
2021-02-12 08:20:45 +01:00
STATICFILES_DIRS = [ " static/ " ]
2020-06-08 03:58:37 +02:00
if DEBUG :
2021-03-17 03:11:19 +01:00
WEBPACK_BUNDLES = " ../webpack/ "
WEBPACK_STATS_FILE = os . path . join ( DEPLOY_ROOT , " var " , " webpack-stats-dev.json " )
2020-06-08 03:58:37 +02:00
else :
2021-03-17 03:11:19 +01:00
WEBPACK_BUNDLES = " webpack-bundles/ "
WEBPACK_STATS_FILE = os . path . join ( DEPLOY_ROOT , " webpack-stats-production.json " )
2020-06-08 03:58:37 +02:00
########################################################################
# TEMPLATES SETTINGS
########################################################################
# List of callables that know how to import templates from various sources.
LOADERS : List [ Union [ str , Tuple [ object , . . . ] ] ] = [
2021-02-12 08:20:45 +01:00
" django.template.loaders.filesystem.Loader " ,
" django.template.loaders.app_directories.Loader " ,
2020-06-08 03:58:37 +02:00
]
if PRODUCTION :
# Template caching is a significant performance win in production.
2021-02-12 08:20:45 +01:00
LOADERS = [ ( " django.template.loaders.cached.Loader " , LOADERS ) ]
2020-06-08 03:58:37 +02:00
base_template_engine_settings : Dict [ str , Any ] = {
2021-02-12 08:20:45 +01:00
" BACKEND " : " django.template.backends.jinja2.Jinja2 " ,
" OPTIONS " : {
" environment " : " zproject.jinja2.environment " ,
" extensions " : [
" jinja2.ext.i18n " ,
" jinja2.ext.autoescape " ,
2020-06-08 03:58:37 +02:00
] ,
2021-02-12 08:20:45 +01:00
" context_processors " : [
" zerver.context_processors.zulip_default_context " ,
" django.template.context_processors.i18n " ,
2020-06-08 03:58:37 +02:00
] ,
} ,
}
default_template_engine_settings = deepcopy ( base_template_engine_settings )
2020-09-03 05:32:15 +02:00
default_template_engine_settings . update (
2021-02-12 08:20:45 +01:00
NAME = " Jinja2 " ,
2020-09-03 05:32:15 +02:00
DIRS = [
2020-06-08 03:58:37 +02:00
# The main templates directory
2021-02-12 08:20:45 +01:00
os . path . join ( DEPLOY_ROOT , " templates " ) ,
2020-06-08 03:58:37 +02:00
# The webhook integration templates
2021-02-12 08:20:45 +01:00
os . path . join ( DEPLOY_ROOT , " zerver " , " webhooks " ) ,
2020-06-08 03:58:37 +02:00
# The python-zulip-api:zulip_bots package templates
2021-02-12 08:20:45 +01:00
os . path . join ( " static " if DEBUG else STATIC_ROOT , " generated " , " bots " ) ,
2020-06-08 03:58:37 +02:00
] ,
2020-09-03 05:32:15 +02:00
APP_DIRS = True ,
)
2020-06-08 03:58:37 +02:00
non_html_template_engine_settings = deepcopy ( base_template_engine_settings )
2020-09-03 05:32:15 +02:00
non_html_template_engine_settings . update (
2021-02-12 08:20:45 +01:00
NAME = " Jinja2_plaintext " ,
DIRS = [ os . path . join ( DEPLOY_ROOT , " templates " ) ] ,
2020-09-03 05:32:15 +02:00
APP_DIRS = False ,
)
2021-02-12 08:20:45 +01:00
non_html_template_engine_settings [ " OPTIONS " ] . update (
2020-09-03 05:32:15 +02:00
autoescape = False ,
trim_blocks = True ,
lstrip_blocks = True ,
)
2020-06-08 03:58:37 +02:00
# django-two-factor uses the default Django template engine (not Jinja2), so we
# need to add config for it here.
2021-02-12 08:20:45 +01:00
two_factor_template_options = deepcopy ( default_template_engine_settings [ " OPTIONS " ] )
del two_factor_template_options [ " environment " ]
del two_factor_template_options [ " extensions " ]
two_factor_template_options [ " loaders " ] = [ " zproject.settings.TwoFactorLoader " ]
2020-06-08 03:58:37 +02:00
two_factor_template_engine_settings = {
2021-02-12 08:20:45 +01:00
" NAME " : " Two_Factor " ,
" BACKEND " : " django.template.backends.django.DjangoTemplates " ,
" DIRS " : [ ] ,
" APP_DIRS " : False ,
" OPTIONS " : two_factor_template_options ,
2020-06-08 03:58:37 +02:00
}
# The order here is important; get_template and related/parent functions try
# the template engines in order until one succeeds.
TEMPLATES = [
default_template_engine_settings ,
non_html_template_engine_settings ,
two_factor_template_engine_settings ,
]
########################################################################
# LOGGING SETTINGS
########################################################################
2021-02-12 08:19:30 +01:00
2020-06-08 03:58:37 +02:00
def zulip_path ( path : str ) - > str :
if DEVELOPMENT :
# if DEVELOPMENT, store these files in the Zulip checkout
if path . startswith ( " /var/log " ) :
path = os . path . join ( DEVELOPMENT_LOG_DIRECTORY , os . path . basename ( path ) )
else :
2021-02-12 08:20:45 +01:00
path = os . path . join ( os . path . join ( DEPLOY_ROOT , " var " ) , os . path . basename ( path ) )
2020-06-08 03:58:37 +02:00
return path
2021-02-12 08:19:30 +01:00
2020-06-08 03:58:37 +02:00
SERVER_LOG_PATH = zulip_path ( " /var/log/zulip/server.log " )
ERROR_FILE_LOG_PATH = zulip_path ( " /var/log/zulip/errors.log " )
MANAGEMENT_LOG_PATH = zulip_path ( " /var/log/zulip/manage.log " )
WORKER_LOG_PATH = zulip_path ( " /var/log/zulip/workers.log " )
SLOW_QUERIES_LOG_PATH = zulip_path ( " /var/log/zulip/slow_queries.log " )
JSON_PERSISTENT_QUEUE_FILENAME_PATTERN = zulip_path ( " /home/zulip/tornado/event_queues %s .json " )
EMAIL_LOG_PATH = zulip_path ( " /var/log/zulip/send_email.log " )
EMAIL_MIRROR_LOG_PATH = zulip_path ( " /var/log/zulip/email_mirror.log " )
2020-10-24 02:28:13 +02:00
EMAIL_DELIVERER_LOG_PATH = zulip_path ( " /var/log/zulip/email_deliverer.log " )
2020-06-08 03:58:37 +02:00
EMAIL_CONTENT_LOG_PATH = zulip_path ( " /var/log/zulip/email_content.log " )
LDAP_LOG_PATH = zulip_path ( " /var/log/zulip/ldap.log " )
LDAP_SYNC_LOG_PATH = zulip_path ( " /var/log/zulip/sync_ldap_user_data.log " )
QUEUE_ERROR_DIR = zulip_path ( " /var/log/zulip/queue_error " )
QUEUE_STATS_DIR = zulip_path ( " /var/log/zulip/queue_stats " )
DIGEST_LOG_PATH = zulip_path ( " /var/log/zulip/digest.log " )
ANALYTICS_LOG_PATH = zulip_path ( " /var/log/zulip/analytics.log " )
ANALYTICS_LOCK_DIR = zulip_path ( " /home/zulip/deployments/analytics-lock-dir " )
2020-08-20 00:34:12 +02:00
WEBHOOK_LOG_PATH = zulip_path ( " /var/log/zulip/webhooks_errors.log " )
2020-08-19 22:26:38 +02:00
WEBHOOK_UNSUPPORTED_EVENTS_LOG_PATH = zulip_path ( " /var/log/zulip/webhooks_unsupported_events.log " )
2020-06-08 03:58:37 +02:00
SOFT_DEACTIVATION_LOG_PATH = zulip_path ( " /var/log/zulip/soft_deactivation.log " )
TRACEMALLOC_DUMP_DIR = zulip_path ( " /var/log/zulip/tracemalloc " )
2021-05-18 01:22:05 +02:00
DELIVER_SCHEDULED_MESSAGES_LOG_PATH = zulip_path ( " /var/log/zulip/deliver_scheduled_messages.log " )
2020-06-08 03:58:37 +02:00
RETENTION_LOG_PATH = zulip_path ( " /var/log/zulip/message_retention.log " )
AUTH_LOG_PATH = zulip_path ( " /var/log/zulip/auth.log " )
2021-09-10 18:36:56 +02:00
SCIM_LOG_PATH = zulip_path ( " /var/log/zulip/scim.log " )
2020-06-08 03:58:37 +02:00
2021-02-12 08:20:45 +01:00
ZULIP_WORKER_TEST_FILE = " /tmp/zulip-worker-test-file "
2020-06-08 03:58:37 +02:00
if IS_WORKER :
FILE_LOG_PATH = WORKER_LOG_PATH
else :
FILE_LOG_PATH = SERVER_LOG_PATH
# This is disabled in a few tests.
LOGGING_ENABLED = True
2020-09-02 06:59:07 +02:00
DEFAULT_ZULIP_HANDLERS = [
2021-02-12 08:20:45 +01:00
* ( [ " zulip_admins " ] if ERROR_REPORTING else [ ] ) ,
" console " ,
" file " ,
" errors_file " ,
2020-09-02 06:59:07 +02:00
]
2020-06-08 03:58:37 +02:00
LOGGING : Dict [ str , Any ] = {
2021-02-12 08:20:45 +01:00
" version " : 1 ,
" disable_existing_loggers " : False ,
" formatters " : {
" default " : {
" () " : " zerver.lib.logging_util.ZulipFormatter " ,
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
} ,
2021-02-12 08:20:45 +01:00
" webhook_request_data " : {
" () " : " zerver.lib.logging_util.ZulipWebhookFormatter " ,
2020-09-04 03:38:24 +02:00
} ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" filters " : {
" ZulipLimiter " : {
" () " : " zerver.lib.logging_util.ZulipLimiter " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" EmailLimiter " : {
" () " : " zerver.lib.logging_util.EmailLimiter " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" require_debug_false " : {
" () " : " django.utils.log.RequireDebugFalse " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" require_debug_true " : {
" () " : " django.utils.log.RequireDebugTrue " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" nop " : {
" () " : " zerver.lib.logging_util.ReturnTrue " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" require_logging_enabled " : {
" () " : " zerver.lib.logging_util.ReturnEnabled " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" require_really_deployed " : {
" () " : " zerver.lib.logging_util.RequireReallyDeployed " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" skip_200_and_304 " : {
" () " : " django.utils.log.CallbackFilter " ,
" callback " : zerver . lib . logging_util . skip_200_and_304 ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" skip_site_packages_logs " : {
" () " : " django.utils.log.CallbackFilter " ,
" callback " : zerver . lib . logging_util . skip_site_packages_logs ,
2020-06-08 03:58:37 +02:00
} ,
} ,
2021-02-12 08:20:45 +01:00
" handlers " : {
" zulip_admins " : {
" level " : " ERROR " ,
" class " : " zerver.logging_handlers.AdminNotifyHandler " ,
" filters " : (
[ " ZulipLimiter " , " require_debug_false " , " require_really_deployed " ]
2021-02-12 08:19:30 +01:00
if not DEBUG_ERROR_REPORTING
else [ ]
) ,
2021-02-12 08:20:45 +01:00
" formatter " : " default " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" auth_file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : AUTH_LOG_PATH ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" console " : {
" level " : " DEBUG " ,
" class " : " logging.StreamHandler " ,
" formatter " : " default " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : FILE_LOG_PATH ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" errors_file " : {
" level " : " WARNING " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : ERROR_FILE_LOG_PATH ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" ldap_file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : LDAP_LOG_PATH ,
2020-06-08 03:58:37 +02:00
} ,
2021-09-10 18:36:56 +02:00
" scim_file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : SCIM_LOG_PATH ,
} ,
2021-02-12 08:20:45 +01:00
" slow_queries_file " : {
" level " : " INFO " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " default " ,
" filename " : SLOW_QUERIES_LOG_PATH ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" webhook_file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " webhook_request_data " ,
" filename " : WEBHOOK_LOG_PATH ,
2020-09-02 03:15:08 +02:00
} ,
2021-02-12 08:20:45 +01:00
" webhook_unsupported_file " : {
" level " : " DEBUG " ,
" class " : " logging.handlers.WatchedFileHandler " ,
" formatter " : " webhook_request_data " ,
" filename " : WEBHOOK_UNSUPPORTED_EVENTS_LOG_PATH ,
2020-09-02 03:15:08 +02:00
} ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" loggers " : {
2020-06-08 03:58:37 +02:00
# The Python logging module uses a hierarchy of logger names for config:
# "foo.bar" has parent "foo" has parent "", the root. But the semantics
# are subtle: it walks this hierarchy once to find the log level to
# decide whether to log the record at all, then a separate time to find
# handlers to emit the record.
#
# For `level`, the most specific ancestor that has a `level` counts.
# For `handlers`, the most specific ancestor that has a `handlers`
# counts (assuming we set `propagate=False`, which we always do.)
# These are independent -- they might come at the same layer, or
# either one could come before the other.
#
# For `filters`, no ancestors count at all -- only the exact logger name
# the record was logged at.
#
# Upstream docs: https://docs.python.org/3/library/logging
#
# Style rules:
# * Always set `propagate=False` if setting `handlers`.
# * Setting `level` equal to the parent is redundant; don't.
# * Setting `handlers` equal to the parent is redundant; don't.
# * Always write in order: level, filters, handlers, propagate.
# root logger
2021-02-12 08:20:45 +01:00
" " : {
" level " : " INFO " ,
" filters " : [ " require_logging_enabled " ] ,
" handlers " : DEFAULT_ZULIP_HANDLERS ,
2020-06-08 03:58:37 +02:00
} ,
# Django, alphabetized
2021-02-12 08:20:45 +01:00
" django " : {
2020-06-08 03:58:37 +02:00
# Django's default logging config has already set some
# things on this logger. Just mentioning it here causes
# `logging.config` to reset it to defaults, as if never
# configured; which is what we want for it.
} ,
2021-02-12 08:20:45 +01:00
" django.request " : {
2020-06-08 03:58:37 +02:00
# We set this to ERROR to prevent Django's default
# low-value logs with lines like "Not Found: /robots.txt"
# from being logged for every HTTP 4xx error at WARNING
# level, which would otherwise end up spamming our
# errors.log. We'll still get logs in errors.log
# including tracebacks for 5xx errors (i.e. Python
# exceptions).
2021-02-12 08:20:45 +01:00
" level " : " ERROR " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" django.security.DisallowedHost " : {
" handlers " : [ " file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" django.server " : {
" filters " : [ " skip_200_and_304 " ] ,
" handlers " : [ " console " , " file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" django.utils.autoreload " : {
2020-06-08 03:58:37 +02:00
# We don't want logging spam from the autoreloaders in development.
2021-02-12 08:20:45 +01:00
" level " : " WARNING " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" django.template " : {
" level " : " DEBUG " ,
" filters " : [ " require_debug_true " , " skip_site_packages_logs " ] ,
" handlers " : [ " console " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
## Uncomment the following to get all database queries logged to the console
# 'django.db': {
# 'level': 'DEBUG',
# 'handlers': ['console'],
# 'propagate': False,
# },
# other libraries, alphabetized
2021-02-12 08:20:45 +01:00
" django_auth_ldap " : {
" level " : " DEBUG " ,
" handlers " : [ " console " , " ldap_file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-09-10 18:36:56 +02:00
" django_scim " : {
" level " : " DEBUG " ,
" handlers " : [ " scim_file " , " errors_file " ] ,
" propagate " : False ,
} ,
2021-02-12 08:20:45 +01:00
" pika " : {
2020-06-08 03:58:37 +02:00
# pika is super chatty on INFO.
2021-02-12 08:20:45 +01:00
" level " : " WARNING " ,
2020-06-08 03:58:37 +02:00
# pika spews a lot of ERROR logs when a connection fails.
# We reconnect automatically, so those should be treated as WARNING --
# write to the log for use in debugging, but no error emails/Zulips.
2021-02-12 08:20:45 +01:00
" handlers " : [ " console " , " file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" requests " : {
" level " : " WARNING " ,
2020-06-08 03:58:37 +02:00
} ,
# our own loggers, alphabetized
2021-02-12 08:20:45 +01:00
" zerver.lib.digest " : {
" level " : " DEBUG " ,
2020-06-08 03:58:37 +02:00
} ,
2021-05-11 03:32:31 +02:00
" zerver.management.commands.deliver_scheduled_emails " : {
2021-02-12 08:20:45 +01:00
" level " : " DEBUG " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zerver.management.commands.enqueue_digest_emails " : {
" level " : " DEBUG " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zerver.management.commands.deliver_scheduled_messages " : {
" level " : " DEBUG " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.auth " : {
" level " : " DEBUG " ,
" handlers " : [ * DEFAULT_ZULIP_HANDLERS , " auth_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.ldap " : {
" level " : " DEBUG " ,
" handlers " : [ " console " , " ldap_file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.management " : {
" handlers " : [ " file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.queue " : {
" level " : " WARNING " ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.retention " : {
" handlers " : [ " file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.slow_queries " : {
" level " : " INFO " ,
" handlers " : [ " slow_queries_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.soft_deactivation " : {
" handlers " : [ " file " , " errors_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2020-07-28 01:29:34 +02:00
# This logger is used only for automated tests validating the
# error-handling behavior of the zulip_admins handler.
2021-02-12 08:20:45 +01:00
" zulip.test_zulip_admins_handler " : {
" handlers " : [ " zulip_admins " ] ,
" propagate " : False ,
2020-07-28 01:29:34 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.zerver.webhooks " : {
" level " : " DEBUG " ,
" handlers " : [ " file " , " errors_file " , " webhook_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
2021-02-12 08:20:45 +01:00
" zulip.zerver.webhooks.unsupported " : {
" level " : " DEBUG " ,
" handlers " : [ " webhook_unsupported_file " ] ,
" propagate " : False ,
2020-06-08 03:58:37 +02:00
} ,
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
} ,
2020-06-08 03:58:37 +02:00
}
2021-05-21 16:58:50 +02:00
# Silence CryptographyDeprecationWarning spam from a dependency:
# /srv/zulip-py3-venv/lib/python3.6/site-packages/jose/backends/cryptography_backend.py:18: CryptographyDeprecationWarning: int_from_bytes is deprecated, use int.from_bytes instead
# TODO: Clean this up when possible after future dependency upgrades.
warnings . filterwarnings ( " ignore " , category = CryptographyDeprecationWarning , module = " jose.* " )
2020-06-08 03:58:37 +02:00
if DEVELOPMENT :
2021-02-12 08:20:45 +01:00
CONTRIBUTOR_DATA_FILE_PATH = os . path . join ( DEPLOY_ROOT , " var/github-contributors.json " )
2020-06-08 03:58:37 +02:00
else :
2021-02-12 08:20:45 +01:00
CONTRIBUTOR_DATA_FILE_PATH = " /var/lib/zulip/github-contributors.json "
2020-06-08 03:58:37 +02:00
2021-02-12 08:20:45 +01:00
LOGIN_REDIRECT_URL = " / "
2020-06-08 03:58:37 +02:00
2021-06-04 15:12:37 +02:00
# Client-side polling timeout for get_events, in seconds.
2020-06-08 03:58:37 +02:00
# We configure this here so that the client test suite can override it.
# We already kill the connection server-side with heartbeat events,
# but it's good to have a safety. This value should be greater than
# (HEARTBEAT_MIN_FREQ_SECS + 10)
2021-06-04 15:12:37 +02:00
EVENT_QUEUE_LONGPOLL_TIMEOUT_SECONDS = 90
2020-06-08 03:58:37 +02:00
########################################################################
# SSO AND LDAP SETTINGS
########################################################################
2020-09-03 06:54:56 +02:00
USING_LDAP = " zproject.backends.ZulipLDAPAuthBackend " in AUTHENTICATION_BACKENDS
ONLY_LDAP = AUTHENTICATION_BACKENDS == ( " zproject.backends.ZulipLDAPAuthBackend " , )
2021-02-12 08:20:45 +01:00
USING_APACHE_SSO = " zproject.backends.ZulipRemoteUserBackend " in AUTHENTICATION_BACKENDS
2020-09-03 06:54:56 +02:00
ONLY_SSO = AUTHENTICATION_BACKENDS == ( " zproject.backends.ZulipRemoteUserBackend " , )
2020-06-08 03:58:37 +02:00
2020-09-03 06:54:56 +02:00
if ONLY_SSO :
2020-06-08 03:58:37 +02:00
HOME_NOT_LOGGED_IN = " /accounts/login/sso/ "
else :
2021-02-12 08:20:45 +01:00
HOME_NOT_LOGGED_IN = " /login/ "
2020-09-03 06:54:56 +02:00
2021-02-12 08:20:45 +01:00
AUTHENTICATION_BACKENDS + = ( " zproject.backends.ZulipDummyBackend " , )
2020-06-08 03:58:37 +02:00
# Redirect to /devlogin/ by default in dev mode
if DEVELOPMENT :
2021-02-12 08:20:45 +01:00
HOME_NOT_LOGGED_IN = " /devlogin/ "
LOGIN_URL = " /devlogin/ "
2020-06-08 03:58:37 +02:00
POPULATE_PROFILE_VIA_LDAP = bool ( AUTH_LDAP_SERVER_URI )
2020-09-03 06:54:56 +02:00
if POPULATE_PROFILE_VIA_LDAP and not USING_LDAP :
2021-02-12 08:20:45 +01:00
AUTHENTICATION_BACKENDS + = ( " zproject.backends.ZulipLDAPUserPopulator " , )
2020-06-08 03:58:37 +02:00
else :
2020-09-03 06:54:56 +02:00
POPULATE_PROFILE_VIA_LDAP = USING_LDAP or POPULATE_PROFILE_VIA_LDAP
2020-06-08 03:58:37 +02:00
if POPULATE_PROFILE_VIA_LDAP :
import ldap
2021-02-12 08:19:30 +01:00
if AUTH_LDAP_BIND_DN and ldap . OPT_REFERRALS not in AUTH_LDAP_CONNECTION_OPTIONS :
2020-06-08 03:58:37 +02:00
# The default behavior of python-ldap (without setting option
# `ldap.OPT_REFERRALS`) is to follow referrals, but anonymously.
# If our original query was non-anonymous, that's unlikely to
# work; skip the referral.
#
# The common case of this is that the server is Active Directory,
# it's already given us the answer we need, and the referral is
# just speculation about someplace else that has data our query
# could in principle match.
AUTH_LDAP_CONNECTION_OPTIONS [ ldap . OPT_REFERRALS ] = 0
if REGISTER_LINK_DISABLED is None :
# The default for REGISTER_LINK_DISABLED is a bit more
# complicated: we want it to be disabled by default for people
# using the LDAP backend that auto-creates users on login.
2020-09-03 06:54:56 +02:00
REGISTER_LINK_DISABLED = ONLY_LDAP
2020-06-08 03:58:37 +02:00
########################################################################
# SOCIAL AUTHENTICATION SETTINGS
########################################################################
2021-02-12 08:19:30 +01:00
SOCIAL_AUTH_FIELDS_STORED_IN_SESSION = [
2021-02-12 08:20:45 +01:00
" subdomain " ,
" is_signup " ,
" mobile_flow_otp " ,
" desktop_flow_otp " ,
" multiuse_object_key " ,
2021-02-12 08:19:30 +01:00
]
2021-02-12 08:20:45 +01:00
SOCIAL_AUTH_LOGIN_ERROR_URL = " /login/ "
2020-06-08 03:58:37 +02:00
2021-08-23 15:14:05 +02:00
if SOCIAL_AUTH_SUBDOMAIN in ROOT_SUBDOMAIN_ALIASES :
ROOT_SUBDOMAIN_ALIASES . remove ( SOCIAL_AUTH_SUBDOMAIN )
2020-06-08 03:58:37 +02:00
# CLIENT is required by PSA's internal implementation. We name it
# SERVICES_ID to make things more readable in the configuration
# and our own custom backend code.
SOCIAL_AUTH_APPLE_CLIENT = SOCIAL_AUTH_APPLE_SERVICES_ID
2021-02-12 08:19:30 +01:00
SOCIAL_AUTH_APPLE_AUDIENCE = [
id for id in [ SOCIAL_AUTH_APPLE_CLIENT , SOCIAL_AUTH_APPLE_APP_ID ] if id is not None
]
2020-06-24 15:28:47 +02:00
2020-06-08 03:58:37 +02:00
if PRODUCTION :
2020-06-25 13:26:17 +02:00
SOCIAL_AUTH_APPLE_SECRET = get_from_file_if_exists ( " /etc/zulip/apple-auth-key.p8 " )
2020-06-08 03:58:37 +02:00
else :
SOCIAL_AUTH_APPLE_SECRET = get_from_file_if_exists ( " zproject/dev_apple.key " )
2021-02-12 08:20:45 +01:00
SOCIAL_AUTH_GITHUB_SECRET = get_secret ( " social_auth_github_secret " )
SOCIAL_AUTH_GITLAB_SECRET = get_secret ( " social_auth_gitlab_secret " )
SOCIAL_AUTH_GITHUB_SCOPE = [ " user:email " ]
2020-06-08 03:58:37 +02:00
if SOCIAL_AUTH_GITHUB_ORG_NAME or SOCIAL_AUTH_GITHUB_TEAM_ID :
SOCIAL_AUTH_GITHUB_SCOPE . append ( " read:org " )
SOCIAL_AUTH_GITHUB_ORG_KEY = SOCIAL_AUTH_GITHUB_KEY
SOCIAL_AUTH_GITHUB_ORG_SECRET = SOCIAL_AUTH_GITHUB_SECRET
SOCIAL_AUTH_GITHUB_TEAM_KEY = SOCIAL_AUTH_GITHUB_KEY
SOCIAL_AUTH_GITHUB_TEAM_SECRET = SOCIAL_AUTH_GITHUB_SECRET
2021-02-12 08:20:45 +01:00
SOCIAL_AUTH_GOOGLE_SECRET = get_secret ( " social_auth_google_secret " )
2020-06-08 03:58:37 +02:00
# Fallback to google-oauth settings in case social auth settings for
2020-10-23 02:43:28 +02:00
# Google are missing; this is for backwards-compatibility with older
2020-06-08 03:58:37 +02:00
# Zulip versions where /etc/zulip/settings.py has not been migrated yet.
2021-02-12 08:20:45 +01:00
GOOGLE_OAUTH2_CLIENT_SECRET = get_secret ( " google_oauth2_client_secret " )
2020-06-08 03:58:37 +02:00
SOCIAL_AUTH_GOOGLE_KEY = SOCIAL_AUTH_GOOGLE_KEY or GOOGLE_OAUTH2_CLIENT_ID
SOCIAL_AUTH_GOOGLE_SECRET = SOCIAL_AUTH_GOOGLE_SECRET or GOOGLE_OAUTH2_CLIENT_SECRET
if PRODUCTION :
SOCIAL_AUTH_SAML_SP_PUBLIC_CERT = get_from_file_if_exists ( " /etc/zulip/saml/zulip-cert.crt " )
2021-02-12 08:19:30 +01:00
SOCIAL_AUTH_SAML_SP_PRIVATE_KEY = get_from_file_if_exists (
" /etc/zulip/saml/zulip-private-key.key "
)
2020-06-08 03:58:37 +02:00
if " signatureAlgorithm " not in SOCIAL_AUTH_SAML_SECURITY_CONFIG :
# If the configuration doesn't explicitly specify the algorithm,
# we set RSA1 with SHA256 to override the python3-saml default, which uses
# insecure SHA1.
default_signature_alg = " http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 "
SOCIAL_AUTH_SAML_SECURITY_CONFIG [ " signatureAlgorithm " ] = default_signature_alg
2021-10-21 14:16:26 +02:00
if " wantMessagesSigned " not in SOCIAL_AUTH_SAML_SECURITY_CONFIG :
# This setting controls whether LogoutRequests delivered to us
# need to be signed. The default of False is not acceptable,
# because we don't want anyone to be able to submit a request
# to get other users logged out.
SOCIAL_AUTH_SAML_SECURITY_CONFIG [ " wantMessagesSigned " ] = True
2020-06-08 03:58:37 +02:00
for idp_name , idp_dict in SOCIAL_AUTH_SAML_ENABLED_IDPS . items ( ) :
if DEVELOPMENT :
2021-02-12 08:20:45 +01:00
idp_dict [ " entity_id " ] = get_secret ( " saml_entity_id " , " " )
idp_dict [ " url " ] = get_secret ( " saml_url " , " " )
idp_dict [ " x509cert_path " ] = " zproject/dev_saml.cert "
2020-06-08 03:58:37 +02:00
# Set `x509cert` if not specified already; also support an override path.
2021-02-12 08:20:45 +01:00
if " x509cert " in idp_dict :
2020-06-08 03:58:37 +02:00
continue
2021-02-12 08:20:45 +01:00
if " x509cert_path " in idp_dict :
path = idp_dict [ " x509cert_path " ]
2020-06-08 03:58:37 +02:00
else :
path = f " /etc/zulip/saml/idps/ { idp_name } .crt "
2021-02-12 08:20:45 +01:00
idp_dict [ " x509cert " ] = get_from_file_if_exists ( path )
2020-06-08 03:58:37 +02:00
SOCIAL_AUTH_PIPELINE = [
2021-02-12 08:20:45 +01:00
" social_core.pipeline.social_auth.social_details " ,
" zproject.backends.social_auth_associate_user " ,
" zproject.backends.social_auth_finish " ,
2020-06-08 03:58:37 +02:00
]
########################################################################
# EMAIL SETTINGS
########################################################################
# Django setting. Not used in the Zulip codebase.
DEFAULT_FROM_EMAIL = ZULIP_ADMINISTRATOR
if EMAIL_BACKEND is not None :
# If the server admin specified a custom email backend, use that.
pass
elif DEVELOPMENT :
# In the dev environment, emails are printed to the run-dev.py console.
2021-02-12 08:20:45 +01:00
EMAIL_BACKEND = " zproject.email_backends.EmailLogBackEnd "
2020-06-08 03:58:37 +02:00
elif not EMAIL_HOST :
# If an email host is not specified, fail gracefully
WARN_NO_EMAIL = True
2021-02-12 08:20:45 +01:00
EMAIL_BACKEND = " django.core.mail.backends.dummy.EmailBackend "
2020-06-08 03:58:37 +02:00
else :
2021-02-12 08:20:45 +01:00
EMAIL_BACKEND = " django.core.mail.backends.smtp.EmailBackend "
2020-06-08 03:58:37 +02:00
2020-07-03 13:46:48 +02:00
EMAIL_TIMEOUT = 15
2020-10-30 12:56:23 +01:00
if DEVELOPMENT :
2021-02-12 08:20:45 +01:00
EMAIL_HOST = get_secret ( " email_host " , " " )
EMAIL_PORT = int ( get_secret ( " email_port " , " 25 " ) )
EMAIL_HOST_USER = get_secret ( " email_host_user " , " " )
EMAIL_USE_TLS = get_secret ( " email_use_tls " , " " ) == " true "
2020-10-30 12:56:23 +01:00
2021-02-12 08:20:45 +01:00
EMAIL_HOST_PASSWORD = get_secret ( " email_password " )
EMAIL_GATEWAY_PASSWORD = get_secret ( " email_gateway_password " )
AUTH_LDAP_BIND_PASSWORD = get_secret ( " auth_ldap_bind_password " , " " )
2020-06-08 03:58:37 +02:00
########################################################################
# MISC SETTINGS
########################################################################
if PRODUCTION :
# Filter out user data
2021-02-12 08:20:45 +01:00
DEFAULT_EXCEPTION_REPORTER_FILTER = " zerver.filters.ZulipExceptionReporterFilter "
2020-06-08 03:58:37 +02:00
# This is a debugging option only
PROFILE_ALL_REQUESTS = False
CROSS_REALM_BOT_EMAILS = {
2021-02-12 08:20:45 +01:00
" notification-bot@zulip.com " ,
" welcome-bot@zulip.com " ,
" emailgateway@zulip.com " ,
2020-06-08 03:58:37 +02:00
}
TWO_FACTOR_PATCH_ADMIN = False
2020-07-02 02:20:55 +02:00
2020-07-02 03:40:33 +02:00
# Allow the environment to override the default DSN
SENTRY_DSN = os . environ . get ( " SENTRY_DSN " , SENTRY_DSN )
2020-07-02 02:20:55 +02:00
if SENTRY_DSN :
from . sentry import setup_sentry
2021-02-12 08:19:30 +01:00
2021-07-15 20:32:35 +02:00
setup_sentry ( SENTRY_DSN , get_config ( " machine " , " deploy_type " , " development " ) )
2021-09-10 18:36:56 +02:00
SCIM_SERVICE_PROVIDER = {
" USER_ADAPTER " : " zerver.lib.scim.ZulipSCIMUser " ,
" USER_FILTER_PARSER " : " zerver.lib.scim_filter.ZulipUserFilterQuery " ,
2021-10-18 16:30:46 +02:00
# NETLOC is actually overridden by the behavior of base_scim_location_getter,
2021-09-10 18:36:56 +02:00
# but django-scim2 requires it to be set, even though it ends up not being used.
# So we need to give it some value here, and EXTERNAL_HOST is the most generic.
" NETLOC " : EXTERNAL_HOST ,
" SCHEME " : EXTERNAL_URI_SCHEME ,
" GET_EXTRA_MODEL_FILTER_KWARGS_GETTER " : " zerver.lib.scim.get_extra_model_filter_kwargs_getter " ,
" BASE_LOCATION_GETTER " : " zerver.lib.scim.base_scim_location_getter " ,
" AUTHENTICATION_SCHEMES " : [
{
" type " : " bearer " ,
" name " : " Bearer " ,
" description " : " Bearer token " ,
} ,
] ,
}