1
0
Fork 0
mirror of https://github.com/YunoHost-Apps/coin_ynh.git synced 2024-09-03 18:16:26 +02:00
coin_ynh/conf/local.py.j2
Alexandre Aubin b4460a3894 Bump sources
2023-12-16 19:13:01 +01:00

75 lines
2.3 KiB
Django/Jinja

# -*- coding: utf-8 -*-
from __future__ import unicode_literals
import os
from .settings_base import *
DEBUG = TEMPLATE_DEBUG = False
ALLOWED_HOSTS = ['{{ domain }}']
URL_PREFIX = '{{ prefix }}'
STATIC_ROOT = '{{ install_dir }}/static'
NOTIFICATION_EMAILS = ['{{ email }}']
DEFAULT_FROM_EMAIL = 'notifier@{{ domain }}'
SITE_URL = "https://{{ domain }}{{ path }}"
SECRET_KEY = '{{ secret }}'
ISP = {
'NAME': '{{ isp_name }}',
'SITE': '{{ isp_site }}',
'EMAIL': '{{ email }}',
}
SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
PROJECT_DIR = os.path.abspath(os.path.dirname(__file__))
DATABASES = {
'default': {
'ENGINE': 'django.db.backends.postgresql_psycopg2',
'NAME': '{{ db_name }}',
'USER': '{{ db_user }}',
'PASSWORD': '{{ db_pwd }}',
'HOST': '127.0.0.1',
'PORT': '5432',
},
}
FEEDS = (('ffdn', 'http://www.ffdn.org/fr/rss.xml', 3),)
# # Tous acces
# # parametrer SSO en protect_uris
# # OU
# # Pas d'acces
# # hook
# # parametrer SSO en protect_uris
# import ldap
# from django_auth_ldap.config import LDAPSearch, PosixGroupType
# AUTHENTICATION_BACKENDS = (
# 'django_auth_ldap.backend.LDAPBackend',
# 'django.contrib.auth.backends.ModelBackend',
# )
# AUTH_LDAP_SERVER_URI = "ldap://localhost:389"
# AUTH_LDAP_USER_SEARCH = LDAPSearch("uid={{ admin }},ou=users,dc=yunohost,dc=org", ldap.SCOPE_SUBTREE, "(uid=%(user)s)")
# AUTH_LDAP_USER_ATTR_MAP = {
# "username": "uid",
# "first_name": "givenName",
# "last_name": "sn",
# "email": "mail",
# }
# AUTH_LDAP_USER_FLAGS_BY_GROUP = {
# "is_active": "cn=sftpusers,ou=groups,dc=yunohost,dc=org",
# "is_staff": "cn=sftpusers,ou=groups,dc=yunohost,dc=org",
# "is_superuser": "cn=sftpusers,ou=groups,dc=yunohost,dc=org"
# }
# AUTH_LDAP_GROUP_SEARCH = LDAPSearch("ou=groups,dc=yunohost,dc=org", ldap.SCOPE_SUBTREE, "(objectClass=posixGroup)")
# AUTH_LDAP_GROUP_TYPE = PosixGroupType()
# AUTH_LDAP_ALWAYS_UPDATE_USER = True
# AUTH_LDAP_AUTHORIZE_ALL_USERS = True
# AUTH_LDAP_FIND_GROUP_PERMS = True
# #AUTH_LDAP_CACHE_GROUPS = True
# #AUTH_LDAP_GROUP_CACHE_TIMEOUT = 300
# #import logging
# #logger = logging.getLogger('django_auth_ldap')
# #logger.addHandler(logging.StreamHandler())
# #logger.setLevel(logging.DEBUG)