mirror of
https://git.linux-kernel.at/oliver/ivatar.git
synced 2025-11-11 10:46:24 +00:00
324 lines
10 KiB
Python
324 lines
10 KiB
Python
"""
|
|
Django settings for ivatar project.
|
|
"""
|
|
|
|
import os
|
|
import logging
|
|
|
|
log_level = logging.DEBUG # pylint: disable=invalid-name
|
|
logger = logging.getLogger("ivatar") # pylint: disable=invalid-name
|
|
logger.setLevel(log_level)
|
|
|
|
PACKAGE_ROOT = os.path.abspath(os.path.dirname(__file__))
|
|
BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
|
|
|
|
# Logging directory - can be overridden in local config
|
|
LOGS_DIR = os.path.join(BASE_DIR, "logs")
|
|
|
|
|
|
def _test_logs_directory_writeability(logs_dir):
|
|
"""
|
|
Test if a logs directory is actually writable by attempting to create and write a test file
|
|
"""
|
|
try:
|
|
# Ensure directory exists
|
|
os.makedirs(logs_dir, exist_ok=True)
|
|
|
|
# Test if we can actually write to the directory
|
|
test_file = os.path.join(logs_dir, ".write_test")
|
|
with open(test_file, "w") as f:
|
|
f.write("test")
|
|
|
|
# Clean up test file
|
|
os.remove(test_file)
|
|
return True
|
|
except (OSError, PermissionError):
|
|
return False
|
|
|
|
|
|
# Ensure logs directory exists and is writable - worst case, fall back to /tmp
|
|
if not _test_logs_directory_writeability(LOGS_DIR):
|
|
LOGS_DIR = "/tmp/libravatar-logs"
|
|
if not _test_logs_directory_writeability(LOGS_DIR):
|
|
# If even /tmp fails, use a user-specific temp directory
|
|
import tempfile
|
|
|
|
LOGS_DIR = os.path.join(tempfile.gettempdir(), f"libravatar-logs-{os.getuid()}")
|
|
_test_logs_directory_writeability(LOGS_DIR) # This should always succeed
|
|
|
|
logger.warning(f"Failed to write to logs directory, falling back to {LOGS_DIR}")
|
|
|
|
# SECURITY WARNING: keep the secret key used in production secret!
|
|
SECRET_KEY = "=v(+-^t#ahv^a&&e)uf36g8algj$d1@6ou^w(r0@%)#8mlc*zk"
|
|
|
|
# SECURITY WARNING: don't run with debug turned on in production!
|
|
DEBUG = True
|
|
|
|
ALLOWED_HOSTS = []
|
|
|
|
# Comprehensive Logging Configuration
|
|
LOGGING = {
|
|
"version": 1,
|
|
"disable_existing_loggers": False,
|
|
"formatters": {
|
|
"verbose": {
|
|
"format": "{levelname} {asctime} {module} {process:d} {thread:d} {message}",
|
|
"style": "{",
|
|
},
|
|
"simple": {
|
|
"format": "{levelname} {asctime} {message}",
|
|
"style": "{",
|
|
},
|
|
"detailed": {
|
|
"format": "{levelname} {asctime} {name} {module} {funcName} {lineno:d} {message}",
|
|
"style": "{",
|
|
},
|
|
},
|
|
"handlers": {
|
|
"file": {
|
|
"level": "INFO",
|
|
"class": "logging.FileHandler",
|
|
"filename": os.path.join(LOGS_DIR, "ivatar.log"),
|
|
"formatter": "verbose",
|
|
},
|
|
"file_debug": {
|
|
"level": "DEBUG",
|
|
"class": "logging.FileHandler",
|
|
"filename": os.path.join(LOGS_DIR, "ivatar_debug.log"),
|
|
"formatter": "detailed",
|
|
},
|
|
"console": {
|
|
"level": "DEBUG" if DEBUG else "INFO",
|
|
"class": "logging.StreamHandler",
|
|
"formatter": "simple",
|
|
},
|
|
"security": {
|
|
"level": "WARNING",
|
|
"class": "logging.FileHandler",
|
|
"filename": os.path.join(LOGS_DIR, "security.log"),
|
|
"formatter": "detailed",
|
|
},
|
|
},
|
|
"loggers": {
|
|
"ivatar": {
|
|
"handlers": ["file", "console"],
|
|
"level": "INFO", # Restore normal logging level
|
|
"propagate": True,
|
|
},
|
|
"ivatar.security": {
|
|
"handlers": ["security", "console"],
|
|
"level": "WARNING",
|
|
"propagate": False,
|
|
},
|
|
"ivatar.debug": {
|
|
"handlers": ["file_debug"],
|
|
"level": "DEBUG",
|
|
"propagate": False,
|
|
},
|
|
"django.security": {
|
|
"handlers": ["security"],
|
|
"level": "WARNING",
|
|
"propagate": False,
|
|
},
|
|
},
|
|
"root": {
|
|
"handlers": ["console"],
|
|
"level": "INFO",
|
|
},
|
|
}
|
|
|
|
|
|
# Application definition
|
|
|
|
INSTALLED_APPS = [
|
|
"django.contrib.admin",
|
|
"django.contrib.auth",
|
|
"django.contrib.contenttypes",
|
|
"django.contrib.sessions",
|
|
"django.contrib.messages",
|
|
"django.contrib.staticfiles",
|
|
"social_django",
|
|
]
|
|
|
|
MIDDLEWARE = [
|
|
"django.middleware.security.SecurityMiddleware",
|
|
"django.contrib.sessions.middleware.SessionMiddleware",
|
|
"django.middleware.common.CommonMiddleware",
|
|
"django.middleware.csrf.CsrfViewMiddleware",
|
|
"django.contrib.auth.middleware.AuthenticationMiddleware",
|
|
"django.contrib.messages.middleware.MessageMiddleware",
|
|
"django.middleware.clickjacking.XFrameOptionsMiddleware",
|
|
]
|
|
|
|
ROOT_URLCONF = "ivatar.urls"
|
|
|
|
TEMPLATES = [
|
|
{
|
|
"BACKEND": "django.template.backends.django.DjangoTemplates",
|
|
"DIRS": [os.path.join(BASE_DIR, "templates")],
|
|
"APP_DIRS": True,
|
|
"OPTIONS": {
|
|
"context_processors": [
|
|
"django.template.context_processors.debug",
|
|
"django.template.context_processors.request",
|
|
"django.contrib.auth.context_processors.auth",
|
|
"django.contrib.messages.context_processors.messages",
|
|
"django.template.context_processors.i18n",
|
|
"social_django.context_processors.login_redirect",
|
|
],
|
|
"debug": DEBUG,
|
|
},
|
|
},
|
|
]
|
|
|
|
WSGI_APPLICATION = "ivatar.wsgi.application"
|
|
|
|
|
|
# Database
|
|
# https://docs.djangoproject.com/en/2.0/ref/settings/#databases
|
|
|
|
DATABASES = {
|
|
"default": {
|
|
"ENGINE": "django.db.backends.sqlite3",
|
|
"NAME": os.path.join(BASE_DIR, "db.sqlite3"),
|
|
"ATOMIC_REQUESTS": True,
|
|
}
|
|
}
|
|
|
|
|
|
# Password validation
|
|
# https://docs.djangoproject.com/en/2.0/ref/settings/#auth-password-validators
|
|
|
|
AUTH_PASSWORD_VALIDATORS = [
|
|
{
|
|
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator", # noqa
|
|
},
|
|
{
|
|
"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator", # noqa
|
|
"OPTIONS": {
|
|
"min_length": 6,
|
|
},
|
|
},
|
|
{
|
|
"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator", # noqa
|
|
},
|
|
{
|
|
"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator", # noqa
|
|
},
|
|
]
|
|
|
|
# Password Hashing (more secure)
|
|
# Try to use Argon2PasswordHasher with high security settings, fallback to PBKDF2
|
|
PASSWORD_HASHERS = []
|
|
|
|
# Try Argon2 first (requires Python 3.6+ and argon2-cffi package)
|
|
try:
|
|
import argon2 # noqa: F401
|
|
|
|
PASSWORD_HASHERS.append("django.contrib.auth.hashers.Argon2PasswordHasher")
|
|
except ImportError:
|
|
# Fallback for CentOS 7 / older systems without argon2-cffi
|
|
pass
|
|
|
|
# Always include PBKDF2 as fallback
|
|
PASSWORD_HASHERS.extend(
|
|
[
|
|
"django.contrib.auth.hashers.PBKDF2PasswordHasher",
|
|
# Keep PBKDF2SHA1 for existing password compatibility only
|
|
"django.contrib.auth.hashers.PBKDF2SHA1PasswordHasher",
|
|
]
|
|
)
|
|
|
|
# Security Settings
|
|
SECURE_BROWSER_XSS_FILTER = True
|
|
SECURE_CONTENT_TYPE_NOSNIFF = True
|
|
X_FRAME_OPTIONS = "DENY"
|
|
CSRF_COOKIE_SECURE = not DEBUG
|
|
SESSION_COOKIE_SECURE = not DEBUG
|
|
|
|
if not DEBUG:
|
|
SECURE_SSL_REDIRECT = True
|
|
SECURE_HSTS_SECONDS = 31536000 # 1 year
|
|
SECURE_HSTS_INCLUDE_SUBDOMAINS = True
|
|
SECURE_HSTS_PRELOAD = True
|
|
|
|
|
|
# Social authentication
|
|
TRUST_EMAIL_FROM_SOCIAL_AUTH_BACKENDS = ["fedora"]
|
|
SOCIAL_AUTH_PIPELINE = (
|
|
# Get the information we can about the user and return it in a simple
|
|
# format to create the user instance later. In some cases the details are
|
|
# already part of the auth response from the provider, but sometimes this
|
|
# could hit a provider API.
|
|
"social_core.pipeline.social_auth.social_details",
|
|
# Get the social uid from whichever service we're authing thru. The uid is
|
|
# the unique identifier of the given user in the provider.
|
|
"social_core.pipeline.social_auth.social_uid",
|
|
# Verifies that the current auth process is valid within the current
|
|
# project, this is where emails and domains whitelists are applied (if
|
|
# defined).
|
|
"social_core.pipeline.social_auth.auth_allowed",
|
|
# Checks if the current social-account is already associated in the site.
|
|
"social_core.pipeline.social_auth.social_user",
|
|
# Make up a username for this person, appends a random string at the end if
|
|
# there's any collision.
|
|
"social_core.pipeline.user.get_username",
|
|
# Send a validation email to the user to verify its email address.
|
|
# Disabled by default.
|
|
# 'social_core.pipeline.mail.mail_validation',
|
|
# Associates the current social details with another user account with
|
|
# a similar email address. Disabled by default.
|
|
"social_core.pipeline.social_auth.associate_by_email",
|
|
# Associates the current social details with an existing user account with
|
|
# a matching ConfirmedEmail.
|
|
"ivatar.ivataraccount.auth.associate_by_confirmed_email",
|
|
# Create a user account if we haven't found one yet.
|
|
"social_core.pipeline.user.create_user",
|
|
# Create the record that associates the social account with the user.
|
|
"social_core.pipeline.social_auth.associate_user",
|
|
# Populate the extra_data field in the social record with the values
|
|
# specified by settings (and the default ones like access_token, etc).
|
|
"social_core.pipeline.social_auth.load_extra_data",
|
|
# Update the user record with any changed info from the auth service.
|
|
"social_core.pipeline.user.user_details",
|
|
# Create the ConfirmedEmail if appropriate.
|
|
"ivatar.ivataraccount.auth.add_confirmed_email",
|
|
)
|
|
|
|
|
|
# Internationalization
|
|
# https://docs.djangoproject.com/en/2.0/topics/i18n/
|
|
|
|
LANGUAGE_CODE = "en-us"
|
|
|
|
TIME_ZONE = "UTC"
|
|
|
|
USE_I18N = True
|
|
|
|
USE_L10N = True
|
|
|
|
USE_TZ = True
|
|
|
|
|
|
# Static files configuration (esp. req. during dev.)
|
|
PROJECT_ROOT = os.path.abspath(os.path.join(os.path.dirname(__file__), os.pardir))
|
|
STATIC_URL = "/static/"
|
|
STATIC_ROOT = os.path.join(BASE_DIR, "static")
|
|
|
|
DEFAULT_AUTO_FIELD = "django.db.models.BigAutoField"
|
|
|
|
from config import * # pylint: disable=wildcard-import,wrong-import-position,unused-wildcard-import # noqa
|
|
|
|
# OpenTelemetry setup - must be after config import
|
|
# Always setup OpenTelemetry (instrumentation always enabled, export controlled by OTEL_EXPORT_ENABLED)
|
|
try:
|
|
from ivatar.opentelemetry_config import setup_opentelemetry
|
|
|
|
setup_opentelemetry()
|
|
|
|
# Add OpenTelemetry middleware (always enabled)
|
|
MIDDLEWARE.append("ivatar.opentelemetry_middleware.OpenTelemetryMiddleware")
|
|
except (ImportError, NameError):
|
|
# OpenTelemetry packages not installed or configuration failed
|
|
pass
|