mirror of https://github.com/zulip/zulip.git
194 lines
7.4 KiB
Python
194 lines
7.4 KiB
Python
# Settings for Zulip Enterprise
|
|
|
|
### MANDATORY SETTINGS
|
|
|
|
# The user-accessible Zulip hostname for this installation, e.g.
|
|
# zulip.example.com
|
|
EXTERNAL_HOST = ''
|
|
|
|
# The email address for the person or team who maintain the Zulip
|
|
# Enterprise installation. Will also get support emails. (e.g. zulip-admin@example.com)
|
|
ZULIP_ADMINISTRATOR = ''
|
|
|
|
# The domain for your organization, e.g. example.com
|
|
ADMIN_DOMAIN = ''
|
|
|
|
# The deployment key is used by your server to authenticate any
|
|
# communication with Zulip. You can obtain your key from
|
|
# https://zulip.com/enterprise/download/deployment-key
|
|
DEPLOYMENT_ROLE_KEY = ''
|
|
|
|
# Enable at least one of the following authentication backends.
|
|
AUTHENTICATION_BACKENDS = (
|
|
# 'zproject.backends.EmailAuthBackend', # Email and password
|
|
# 'zproject.backends.ZulipRemoteUserBackend', # Local SSO
|
|
# 'zproject.backends.GoogleBackend', # Google Apps
|
|
)
|
|
|
|
# If you are using the ZulipRemoteUserBackend authentication backend,
|
|
# set this to your domain (e.g. if REMOTE_USER is "username" and the
|
|
# corresponding email address is "username@example.com", set
|
|
# SSO_APPEND_DOMAIN = "example.com")
|
|
SSO_APPEND_DOMAIN = None
|
|
|
|
# Configure the outgoing SMTP server below. For outgoing email
|
|
# via a GMail SMTP server, EMAIL_USE_TLS must be True and the
|
|
# outgoing port must be 587. The EMAIL_HOST is prepopulated
|
|
# for GMail servers, change it for other hosts, or leave it unset
|
|
# or empty to skip sending email.
|
|
EMAIL_HOST = 'smtp.gmail.com'
|
|
EMAIL_HOST_USER = ''
|
|
EMAIL_HOST_PASSWORD = ''
|
|
EMAIL_PORT = 587
|
|
EMAIL_USE_TLS = True
|
|
|
|
# The email From address to be used for automatically generated emails
|
|
DEFAULT_FROM_EMAIL = "Zulip <zulip@example.com>"
|
|
# The noreply address to be used as Reply-To for certain generated emails.
|
|
# Messages sent to this address should not be delivered anywhere.
|
|
NOREPLY_EMAIL_ADDRESS = "noreply@example.com"
|
|
|
|
### OPTIONAL SETTINGS
|
|
|
|
# Controls whether session cookies expire when the browser closes
|
|
SESSION_EXPIRE_AT_BROWSER_CLOSE = False
|
|
|
|
# Session cookie expiry in seconds after the last page load
|
|
SESSION_COOKIE_AGE = 60 * 60 * 24 * 7 * 2 # 2 weeks
|
|
|
|
# Controls whether or not there is a feedback button in the UI.
|
|
ENABLE_FEEDBACK = False
|
|
|
|
# By default, the feedback button will submit feedback to the Zulip
|
|
# developers. If you set FEEDBACK_EMAIL to be an email address
|
|
# (e.g. ZULIP_ADMINISTRATOR), feedback sent by your users will instead
|
|
# be sent to that email address.
|
|
FEEDBACK_EMAIL = ZULIP_ADMINISTRATOR
|
|
|
|
# Controls whether or not error reports are sent to Zulip. Error
|
|
# reports are used to improve the quality of the product and do not
|
|
# include message contents; please contact Zulip support with any
|
|
# questions.
|
|
ERROR_REPORTING = True
|
|
|
|
# Controls whether or not Zulip will provide inline image preview when
|
|
# a link to an image is referenced in a message.
|
|
INLINE_IMAGE_PREVIEW = True
|
|
|
|
# By default, files uploaded by users and user avatars are stored
|
|
# directly on the Zulip server. If file storage in Amazon S3 (or
|
|
# elsewhere, e.g. your corporate fileshare) is desired, please contact
|
|
# Zulip Support (support@zulip.com) for further instructions on
|
|
# setting up the appropriate integration.
|
|
LOCAL_UPLOADS_DIR = "/home/zulip/uploads"
|
|
|
|
# Controls whether name changes are completely disabled for this installation
|
|
# This is useful in settings where you're syncing names from an integrated LDAP/Active Directory
|
|
NAME_CHANGES_DISABLED = False
|
|
|
|
# Controls whether users who have not uploaded an avatar will receive an avatar
|
|
# from gravatar.com.
|
|
ENABLE_GRAVATAR = True
|
|
|
|
# To override the default avatar image if ENABLE_GRAVATAR is False, place your
|
|
# custom default avatar image at /home/zulip/local-static/default-avatar.png
|
|
# and uncomment the following line.
|
|
#DEFAULT_AVATAR_URI = '/local-static/default-avatar.png'
|
|
|
|
### TWITTER INTEGRATION
|
|
|
|
# Zulip supports showing inline Tweet previews when a tweet is linked
|
|
# to in a message. To support this, Zulip must have access to the
|
|
# Twitter API via OAuth. To obtain the various access tokens needed
|
|
# below, you must register a new application under your Twitter
|
|
# account by doing the following:
|
|
#
|
|
# 1. Log in to http://dev.twitter.com.
|
|
# 2. In the menu under your username, click My Applications. From this page, create a new application.
|
|
# 3. Click on the application you created and click "create my access token". Fill in the requested values.
|
|
TWITTER_CONSUMER_KEY = ''
|
|
TWITTER_CONSUMER_SECRET = ''
|
|
TWITTER_ACCESS_TOKEN_KEY = ''
|
|
TWITTER_ACCESS_TOKEN_SECRET = ''
|
|
|
|
### EMAIL GATEWAY INTEGRATION
|
|
|
|
# The email gateway provides, for each stream, an email address that
|
|
# you can send email to in order to have the email's content be posted
|
|
# to that stream. Emails received at the per-stream email address
|
|
# will be converted into a Zulip message
|
|
|
|
# There are two ways to make use of local email mirroring:
|
|
# 1. Local delivery: A MTA runs locally and passes mail directly to Zulip
|
|
# 2. Polling: Checks an IMAP inbox every minute for new messages.
|
|
|
|
# A Puppet manifest for local delivery via Postfix is available in
|
|
# puppet/zulip/manifests/postfix_localmail.pp. To use the manifest, add it to
|
|
# puppet_classes in /etc/zulip/zulip.conf. This manifest assumes you'll receive
|
|
# mail addressed to the hostname of your Zulip server.
|
|
#
|
|
# Users of other mail servers will need to configure it to pass mail to the
|
|
# email mirror; see `python manage.py email-mirror --help` for details.
|
|
|
|
# The email address pattern to use for auto-generated stream emails
|
|
# The %s will be replaced with a unique token, and the resulting email
|
|
# must be delivered to the EMAIL_GATEWAY_IMAP_FOLDER of the
|
|
# EMAIL_GATEWAY_LOGIN account below, or piped in to the email-mirror management
|
|
# command as indicated above.
|
|
#
|
|
# Example: zulip+%s@example.com
|
|
EMAIL_GATEWAY_PATTERN = ""
|
|
|
|
|
|
# The following options are relevant if you're using mail polling.
|
|
#
|
|
# A sample cron job for mail polling is available at puppet/zulip/files/cron.d/email-mirror
|
|
#
|
|
# The Zulip username of the bot that the email pattern should post as.
|
|
# Example: emailgateway@example.com
|
|
EMAIL_GATEWAY_BOT = ""
|
|
|
|
# Configuration of the email mirror mailbox
|
|
# The IMAP login and password
|
|
EMAIL_GATEWAY_LOGIN = ""
|
|
EMAIL_GATEWAY_PASSWORD = ""
|
|
# The IMAP server & port to connect to
|
|
EMAIL_GATEWAY_IMAP_SERVER = ""
|
|
EMAIL_GATEWAY_IMAP_PORT = 993
|
|
# The IMAP folder name to check for emails. All emails sent to EMAIL_GATEWAY_PATTERN above
|
|
# must be delivered to this folder
|
|
EMAIL_GATEWAY_IMAP_FOLDER = "INBOX"
|
|
|
|
### LDAP integration configuration
|
|
# Zulip supports retrieving information about users via LDAP, and optionally
|
|
# using LDAP as an authentication mechanism.
|
|
|
|
import ldap
|
|
from django_auth_ldap.config import LDAPSearch, GroupOfNamesType
|
|
|
|
# URI of your LDAP server. If set, LDAP is used to prepopulate a user's name in
|
|
# Zulip. Example: "ldaps://ldap.example.com"
|
|
AUTH_LDAP_SERVER_URI = ""
|
|
|
|
# This DN and password will be used to bind to your server. If unset, anonymous
|
|
# binds are performed.
|
|
AUTH_LDAP_BIND_DN = ""
|
|
AUTH_LDAP_BIND_PASSWORD = ""
|
|
|
|
# Specify the search base and the property to filter on that corresponds to the
|
|
# username.
|
|
AUTH_LDAP_USER_SEARCH = LDAPSearch("ou=users,dc=example,dc=com",
|
|
ldap.SCOPE_SUBTREE, "(uid=%(user)s)")
|
|
|
|
# If the value of a user's "uid" (or similar) property is not their email
|
|
# address, specify the domain to append here.
|
|
LDAP_APPEND_DOMAIN = ADMIN_DOMAIN
|
|
|
|
# This map defines how to populate attributes of a Zulip user from LDAP.
|
|
AUTH_LDAP_USER_ATTR_MAP = {
|
|
# Populate the Django user's name from the LDAP directory.
|
|
"full_name": "cn",
|
|
}
|
|
|
|
CAMO_URI = ''
|