BUILD_PATH = 'builds' INTERNAL_IPS = ('127.0.0.1', '10.22.74.139', '10.250.2.54') # Use sha 256 by default but support any other algorithm: BASE_PASSWORD_HASHERS = ( 'django.contrib.auth.hashers.SHA1PasswordHasher', 'django.contrib.auth.hashers.MD5PasswordHasher', 'django.contrib.auth.hashers.UnsaltedMD5PasswordHasher', ) HMAC_KEYS = { # for bcrypt only #'2012-06-06': 'cheesecake', } from django_sha2 import get_password_hashers PASSWORD_HASHERS = get_password_hashers(BASE_PASSWORD_HASHERS, HMAC_KEYS) # Migration settings POINTERS = [ ('128.193.76.253', 'cob-dc81.bus.oregonstate.edu', 'forward'), ('128.193.76.254', 'cob-dc82.bus.oregonstate.edu', 'forward'), ('128.193.76.252', 'cob-dc83.bus.oregonstate.edu', 'forward'), ('128.193.76.255', 'cob-dc84.bus.oregonstate.edu', 'forward'), ] NONDELEGATED_NS = [ 'dns.merit.net', 'ns1.nero.net', 'ns1.oregonstate.edu', 'ns1.ucsb.edu', 'ns2.oregonstate.edu' ] SECONDARY_ZONES = [
# Playdoh ships with Bcrypt+HMAC by default because it's the most secure. # To use bcrypt, fill in a secret HMAC key in your local settings. BASE_PASSWORD_HASHERS = ( 'django_sha2.hashers.BcryptHMACCombinedPasswordVerifier', 'django_sha2.hashers.SHA512PasswordHasher', 'django_sha2.hashers.SHA256PasswordHasher', 'django.contrib.auth.hashers.SHA1PasswordHasher', 'django.contrib.auth.hashers.MD5PasswordHasher', 'django.contrib.auth.hashers.UnsaltedMD5PasswordHasher', ) HMAC_KEYS = { # for bcrypt only #'2012-06-06': 'cheesecake', } from django_sha2 import get_password_hashers PASSWORD_HASHERS = get_password_hashers(BASE_PASSWORD_HASHERS, HMAC_KEYS) BROWSERID_VERIFY_CLASS = 'fjord.base.browserid.FjordVerify' BROWSERID_AUDIENCES = ['http://127.0.0.1:8000', 'http://localhost:8000'] LOGIN_URL = '/' LOGIN_REDIRECT_URL = '/' LOGIN_REDIRECT_URL_FAILURE = '/login-failure' # Always generate a CSRF token for anonymous users. ANON_ALWAYS = True # CSRF error page CSRF_FAILURE_VIEW = 'fjord.base.views.csrf_failure' # Tells the extract script what files to look for L10n in and what # function handles the extraction.