ALLOCATION_ENABLE_ALLOCATION_RENEWAL = ENV.bool( 'ALLOCATION_ENABLE_ALLOCATION_RENEWAL', default=True) ALLOCATION_FUNCS_ON_EXPIRE = [ 'coldfront.core.allocation.utils.test_allocation_function', ] # This is in days ALLOCATION_DEFAULT_ALLOCATION_LENGTH = ENV.int( 'ALLOCATION_DEFAULT_ALLOCATION_LENGTH', default=365) #------------------------------------------------------------------------------ # Allow user to select account name for allocation #------------------------------------------------------------------------------ ALLOCATION_ACCOUNT_ENABLED = ENV.bool('ALLOCATION_ACCOUNT_ENABLED', default=False) ALLOCATION_ACCOUNT_MAPPING = ENV.dict('ALLOCATION_ACCOUNT_MAPPING', default={}) SETTINGS_EXPORT += ['ALLOCATION_ACCOUNT_ENABLED'] ADMIN_COMMENTS_SHOW_EMPTY = ENV.bool('ADMIN_COMMENTS_SHOW_EMPTY', default=True) #------------------------------------------------------------------------------ # List of Allocation Attributes to display on view page #------------------------------------------------------------------------------ ALLOCATION_ATTRIBUTE_VIEW_LIST = ENV.list('ALLOCATION_ATTRIBUTE_VIEW_LIST', default=[ 'slurm_account_name', 'freeipa_group', 'Cloud Account Name', ])
#------------------------------------------------------------------------------ # LDAP user authentication using django-auth-ldap. This will enable LDAP # user/password logins. You can also override this in local_settings.py #------------------------------------------------------------------------------ AUTH_LDAP_SERVER_URI = ENV.str('AUTH_LDAP_SERVER_URI') AUTH_LDAP_USER_SEARCH_BASE = ENV.str('AUTH_LDAP_USER_SEARCH_BASE') AUTH_LDAP_START_TLS = ENV.bool('AUTH_LDAP_START_TLS', default=True) AUTH_LDAP_BIND_DN = ENV.str('AUTH_LDAP_BIND_DN', default='') AUTH_LDAP_BIND_PASSWORD = ENV.str('AUTH_LDAP_BIND_PASSWORD', default='') AUTH_LDAP_BIND_AS_AUTHENTICATING_USER = ENV.bool( 'AUTH_LDAP_BIND_AS_AUTHENTICATING_USER', default=False) AUTH_LDAP_MIRROR_GROUPS = ENV.bool('AUTH_LDAP_MIRROR_GROUPS', default=True) AUTH_LDAP_GROUP_SEARCH_BASE = ENV.str('AUTH_LDAP_GROUP_SEARCH_BASE') AUTH_LDAP_USER_SEARCH = LDAPSearch(AUTH_LDAP_USER_SEARCH_BASE, ldap.SCOPE_ONELEVEL, '(uid=%(user)s)') AUTH_LDAP_GROUP_SEARCH = LDAPSearch(AUTH_LDAP_GROUP_SEARCH_BASE, ldap.SCOPE_ONELEVEL, '(objectClass=groupOfNames)') AUTH_LDAP_GROUP_TYPE = GroupOfNamesType() AUTH_LDAP_USER_ATTR_MAP = ENV.dict('AUTH_LDAP_USER_ATTR_MAP', default={ 'username': '******', 'first_name': 'givenName', 'last_name': 'sn', 'email': 'mail', }) AUTHENTICATION_BACKENDS += [ 'django_auth_ldap.backend.LDAPBackend', ]