183 lines
6.1 KiB
Python
183 lines
6.1 KiB
Python
"""
|
|
Django settings for labhelper project.
|
|
|
|
Generated by 'django-admin startproject' using Django 5.2.9.
|
|
|
|
For more information on this file, see
|
|
https://docs.djangoproject.com/en/5.2/topics/settings/
|
|
|
|
For the full list of settings and their values, see
|
|
https://docs.djangoproject.com/en/5.2/ref/settings/
|
|
"""
|
|
|
|
import os
|
|
from pathlib import Path
|
|
|
|
# Build paths inside the project like this: BASE_DIR / 'subdir'.
|
|
BASE_DIR = Path(__file__).resolve().parent.parent
|
|
|
|
|
|
# Quick-start development settings - unsuitable for production
|
|
# See https://docs.djangoproject.com/en/5.2/howto/deployment/checklist/
|
|
|
|
# SECURITY WARNING: keep the secret key used in production secret!
|
|
SECRET_KEY = os.environ.get('DJANGO_SECRET_KEY', 'f0arjg8q3ut4iuqrguqfjaruf0eripIZZN3t1kymy8ugqnj$li2knhha0@gc5v8f3bge=$+gbybj2$jt28uqm')
|
|
|
|
# SECURITY WARNING: don't run with debug turned on in production!
|
|
DEBUG = os.environ.get('DEBUG', 'True').lower() == 'true'
|
|
|
|
ALLOWED_HOSTS = os.environ.get('ALLOWED_HOSTS', '*').split(',')
|
|
ALLOWED_CIDR_NETS = os.environ.get('ALLOWED_CIDR_NETS', '10.0.0.0/16').split(',')
|
|
|
|
|
|
# Application definition
|
|
|
|
INSTALLED_APPS = [
|
|
'django.contrib.admin',
|
|
'django.contrib.auth',
|
|
'django.contrib.contenttypes',
|
|
'django.contrib.sessions',
|
|
'django.contrib.messages',
|
|
'django.contrib.staticfiles',
|
|
'mozilla_django_oidc',
|
|
'mptt',
|
|
'django_mptt_admin',
|
|
'sorl.thumbnail',
|
|
'boxes',
|
|
]
|
|
|
|
MIDDLEWARE = [
|
|
'django.middleware.security.SecurityMiddleware',
|
|
'whitenoise.middleware.WhiteNoiseMiddleware',
|
|
'django.contrib.sessions.middleware.SessionMiddleware',
|
|
'django.middleware.common.CommonMiddleware',
|
|
'django.middleware.csrf.CsrfViewMiddleware',
|
|
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
|
'mozilla_django_oidc.middleware.SessionRefresh',
|
|
'django.contrib.messages.middleware.MessageMiddleware',
|
|
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
|
]
|
|
|
|
ROOT_URLCONF = 'labhelper.urls'
|
|
|
|
TEMPLATES = [
|
|
{
|
|
'BACKEND': 'django.template.backends.django.DjangoTemplates',
|
|
'DIRS': [BASE_DIR / 'labhelper' / 'templates'],
|
|
'APP_DIRS': True,
|
|
'OPTIONS': {
|
|
'context_processors': [
|
|
'django.template.context_processors.request',
|
|
'django.contrib.auth.context_processors.auth',
|
|
'django.contrib.messages.context_processors.messages',
|
|
'labhelper.context_processors.image_tag',
|
|
],
|
|
},
|
|
},
|
|
]
|
|
|
|
WSGI_APPLICATION = 'labhelper.wsgi.application'
|
|
|
|
|
|
# Database
|
|
# https://docs.djangoproject.com/en/5.2/ref/settings/#databases
|
|
|
|
DATABASES = {
|
|
'default': {
|
|
'ENGINE': 'django.db.backends.sqlite3',
|
|
'NAME': BASE_DIR / 'data' / 'db.sqlite3',
|
|
}
|
|
}
|
|
|
|
|
|
# Password validation
|
|
# https://docs.djangoproject.com/en/5.2/ref/settings/#auth-password-validators
|
|
|
|
AUTH_PASSWORD_VALIDATORS = [
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
|
|
},
|
|
{
|
|
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
|
|
},
|
|
]
|
|
|
|
|
|
# Internationalization
|
|
# https://docs.djangoproject.com/en/5.2/topics/i18n/
|
|
|
|
LANGUAGE_CODE = os.environ.get('LANGUAGE_CODE', 'en-us')
|
|
|
|
TIME_ZONE = os.environ.get('TIME_ZONE', 'UTC')
|
|
|
|
USE_I18N = os.environ.get('USE_I18N', 'True').lower() == 'true'
|
|
|
|
USE_TZ = os.environ.get('USE_TZ', 'True').lower() == 'true'
|
|
|
|
|
|
# Static files (CSS, JavaScript, Images)
|
|
# https://docs.djangoproject.com/en/5.2/howto/static-files/
|
|
|
|
STATIC_URL = os.environ.get('STATIC_URL', '/static/')
|
|
STATIC_ROOT = BASE_DIR / 'staticfiles'
|
|
|
|
# WhiteNoise static file serving configuration
|
|
STATICFILES_STORAGE = 'whitenoise.storage.CompressedManifestStaticFilesStorage'
|
|
|
|
# Media files (user uploads)
|
|
MEDIA_URL = os.environ.get('MEDIA_URL', '/media/')
|
|
MEDIA_ROOT = BASE_DIR / 'data' / 'media'
|
|
|
|
# Default primary key field type
|
|
# https://docs.djangoproject.com/en/5.2/ref/settings/#default-auto-field
|
|
|
|
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
|
|
|
|
CSRF_TRUSTED_ORIGINS=os.environ.get('CSRF_TRUSTED_ORIGINS', 'https://labhelper.adebaumann.com,http://127.0.0.1:8000').split(',')
|
|
|
|
LOGIN_URL = os.environ.get('LOGIN_URL', 'oidc_authentication_init')
|
|
LOGIN_REDIRECT_URL = os.environ.get('LOGIN_REDIRECT_URL', 'index')
|
|
LOGOUT_REDIRECT_URL = os.environ.get('LOGOUT_REDIRECT_URL', 'login')
|
|
|
|
AUTHENTICATION_BACKENDS = [
|
|
'labhelper.auth_backend.KeycloakOIDCBackend',
|
|
# ModelBackend kept as fallback for Django admin emergency access
|
|
'django.contrib.auth.backends.ModelBackend',
|
|
]
|
|
|
|
# ---------------------------------------------------------------------------
|
|
# Keycloak / OIDC configuration
|
|
#
|
|
# Set OIDC_OP_BASE_URL to your realm URL, e.g.:
|
|
# https://keycloak.example.com/realms/myrealm
|
|
#
|
|
# All individual endpoints are derived from OIDC_OP_BASE_URL automatically.
|
|
# You can override any individual endpoint with its own env var.
|
|
# ---------------------------------------------------------------------------
|
|
_oidc_base = os.environ.get('OIDC_OP_BASE_URL', '').rstrip('/')
|
|
_oidc_connect = f'{_oidc_base}/protocol/openid-connect' if _oidc_base else ''
|
|
|
|
OIDC_RP_CLIENT_ID = os.environ.get('OIDC_RP_CLIENT_ID', '')
|
|
OIDC_RP_CLIENT_SECRET = os.environ.get('OIDC_RP_CLIENT_SECRET', '')
|
|
OIDC_RP_SIGN_ALGO = 'RS256'
|
|
OIDC_RP_SCOPES = 'openid email profile'
|
|
OIDC_USE_PKCE = True
|
|
|
|
OIDC_OP_AUTHORIZATION_ENDPOINT = os.environ.get('OIDC_OP_AUTHORIZATION_ENDPOINT', f'{_oidc_connect}/auth')
|
|
OIDC_OP_TOKEN_ENDPOINT = os.environ.get('OIDC_OP_TOKEN_ENDPOINT', f'{_oidc_connect}/token')
|
|
OIDC_OP_USER_ENDPOINT = os.environ.get('OIDC_OP_USER_ENDPOINT', f'{_oidc_connect}/userinfo')
|
|
OIDC_OP_JWKS_ENDPOINT = os.environ.get('OIDC_OP_JWKS_ENDPOINT', f'{_oidc_connect}/certs')
|
|
OIDC_OP_LOGOUT_ENDPOINT = os.environ.get('OIDC_OP_LOGOUT_ENDPOINT', f'{_oidc_connect}/logout')
|
|
|
|
# Store the ID token in the session so Keycloak logout can use id_token_hint
|
|
OIDC_STORE_ID_TOKEN = True
|
|
|
|
# Exempt AJAX endpoints from the session-refresh middleware redirect
|
|
OIDC_EXEMPT_URLS = ['search_api']
|