Example #1
0
BUILD_PATH = 'builds'
INTERNAL_IPS = ('127.0.0.1', '10.22.74.139', '10.250.2.54')

# Use sha 256 by default but support any other algorithm:
BASE_PASSWORD_HASHERS = (
    'django.contrib.auth.hashers.SHA1PasswordHasher',
    'django.contrib.auth.hashers.MD5PasswordHasher',
    'django.contrib.auth.hashers.UnsaltedMD5PasswordHasher',
)
HMAC_KEYS = {  # for bcrypt only
    #'2012-06-06': 'cheesecake',
}

from django_sha2 import get_password_hashers
PASSWORD_HASHERS = get_password_hashers(BASE_PASSWORD_HASHERS, HMAC_KEYS)

# Migration settings
POINTERS = [
    ('128.193.76.253', 'cob-dc81.bus.oregonstate.edu', 'forward'),
    ('128.193.76.254', 'cob-dc82.bus.oregonstate.edu', 'forward'),
    ('128.193.76.252', 'cob-dc83.bus.oregonstate.edu', 'forward'),
    ('128.193.76.255', 'cob-dc84.bus.oregonstate.edu', 'forward'),
]

NONDELEGATED_NS = [
    'dns.merit.net', 'ns1.nero.net', 'ns1.oregonstate.edu', 'ns1.ucsb.edu',
    'ns2.oregonstate.edu'
]

SECONDARY_ZONES = [
Example #2
0
# Playdoh ships with Bcrypt+HMAC by default because it's the most secure.
# To use bcrypt, fill in a secret HMAC key in your local settings.
BASE_PASSWORD_HASHERS = (
    'django_sha2.hashers.BcryptHMACCombinedPasswordVerifier',
    'django_sha2.hashers.SHA512PasswordHasher',
    'django_sha2.hashers.SHA256PasswordHasher',
    'django.contrib.auth.hashers.SHA1PasswordHasher',
    'django.contrib.auth.hashers.MD5PasswordHasher',
    'django.contrib.auth.hashers.UnsaltedMD5PasswordHasher',
)
HMAC_KEYS = {  # for bcrypt only
    #'2012-06-06': 'cheesecake',
}

from django_sha2 import get_password_hashers
PASSWORD_HASHERS = get_password_hashers(BASE_PASSWORD_HASHERS, HMAC_KEYS)

BROWSERID_VERIFY_CLASS = 'fjord.base.browserid.FjordVerify'
BROWSERID_AUDIENCES = ['http://127.0.0.1:8000', 'http://localhost:8000']
LOGIN_URL = '/'
LOGIN_REDIRECT_URL = '/'
LOGIN_REDIRECT_URL_FAILURE = '/login-failure'

# Always generate a CSRF token for anonymous users.
ANON_ALWAYS = True

# CSRF error page
CSRF_FAILURE_VIEW = 'fjord.base.views.csrf_failure'

# Tells the extract script what files to look for L10n in and what
# function handles the extraction.