|
|
@@ -378,75 +378,6 @@ LOGIN_URL = '/{}login/'.format(BASE_PATH)
|
|
|
|
|
|
CSRF_TRUSTED_ORIGINS = ALLOWED_HOSTS
|
|
|
|
|
|
-
|
|
|
-#
|
|
|
-# LDAP authentication (optional)
|
|
|
-#
|
|
|
-
|
|
|
-try:
|
|
|
- from netbox import ldap_config as LDAP_CONFIG
|
|
|
-except ImportError:
|
|
|
- LDAP_CONFIG = None
|
|
|
-
|
|
|
-if LDAP_CONFIG is not None:
|
|
|
-
|
|
|
- # Check that django_auth_ldap is installed
|
|
|
- try:
|
|
|
- import ldap
|
|
|
- import django_auth_ldap
|
|
|
- except ImportError:
|
|
|
- raise ImproperlyConfigured(
|
|
|
- "LDAP authentication has been configured, but django-auth-ldap is not installed. Remove "
|
|
|
- "netbox/ldap_config.py to disable LDAP."
|
|
|
- )
|
|
|
-
|
|
|
- # Required configuration parameters
|
|
|
- try:
|
|
|
- AUTH_LDAP_SERVER_URI = getattr(LDAP_CONFIG, 'AUTH_LDAP_SERVER_URI')
|
|
|
- except AttributeError:
|
|
|
- raise ImproperlyConfigured(
|
|
|
- "Required parameter AUTH_LDAP_SERVER_URI is missing from ldap_config.py."
|
|
|
- )
|
|
|
-
|
|
|
- # Optional configuration parameters
|
|
|
- AUTH_LDAP_ALWAYS_UPDATE_USER = getattr(LDAP_CONFIG, 'AUTH_LDAP_ALWAYS_UPDATE_USER', True)
|
|
|
- AUTH_LDAP_AUTHORIZE_ALL_USERS = getattr(LDAP_CONFIG, 'AUTH_LDAP_AUTHORIZE_ALL_USERS', False)
|
|
|
- AUTH_LDAP_BIND_AS_AUTHENTICATING_USER = getattr(LDAP_CONFIG, 'AUTH_LDAP_BIND_AS_AUTHENTICATING_USER', False)
|
|
|
- AUTH_LDAP_BIND_DN = getattr(LDAP_CONFIG, 'AUTH_LDAP_BIND_DN', '')
|
|
|
- AUTH_LDAP_BIND_PASSWORD = getattr(LDAP_CONFIG, 'AUTH_LDAP_BIND_PASSWORD', '')
|
|
|
- AUTH_LDAP_CACHE_TIMEOUT = getattr(LDAP_CONFIG, 'AUTH_LDAP_CACHE_TIMEOUT', 0)
|
|
|
- AUTH_LDAP_CONNECTION_OPTIONS = getattr(LDAP_CONFIG, 'AUTH_LDAP_CONNECTION_OPTIONS', {})
|
|
|
- AUTH_LDAP_DENY_GROUP = getattr(LDAP_CONFIG, 'AUTH_LDAP_DENY_GROUP', None)
|
|
|
- AUTH_LDAP_FIND_GROUP_PERMS = getattr(LDAP_CONFIG, 'AUTH_LDAP_FIND_GROUP_PERMS', False)
|
|
|
- AUTH_LDAP_GLOBAL_OPTIONS = getattr(LDAP_CONFIG, 'AUTH_LDAP_GLOBAL_OPTIONS', {})
|
|
|
- AUTH_LDAP_GROUP_SEARCH = getattr(LDAP_CONFIG, 'AUTH_LDAP_GROUP_SEARCH', None)
|
|
|
- AUTH_LDAP_GROUP_TYPE = getattr(LDAP_CONFIG, 'AUTH_LDAP_GROUP_TYPE', None)
|
|
|
- AUTH_LDAP_MIRROR_GROUPS = getattr(LDAP_CONFIG, 'AUTH_LDAP_MIRROR_GROUPS', None)
|
|
|
- AUTH_LDAP_MIRROR_GROUPS_EXCEPT = getattr(LDAP_CONFIG, 'AUTH_LDAP_MIRROR_GROUPS_EXCEPT', None)
|
|
|
- AUTH_LDAP_PERMIT_EMPTY_PASSWORD = getattr(LDAP_CONFIG, 'AUTH_LDAP_PERMIT_EMPTY_PASSWORD', False)
|
|
|
- AUTH_LDAP_REQUIRE_GROUP = getattr(LDAP_CONFIG, 'AUTH_LDAP_REQUIRE_GROUP', None)
|
|
|
- AUTH_LDAP_NO_NEW_USERS = getattr(LDAP_CONFIG, 'AUTH_LDAP_NO_NEW_USERS', False)
|
|
|
- AUTH_LDAP_START_TLS = getattr(LDAP_CONFIG, 'AUTH_LDAP_START_TLS', False)
|
|
|
- AUTH_LDAP_USER_QUERY_FIELD = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_QUERY_FIELD', None)
|
|
|
- AUTH_LDAP_USER_ATTRLIST = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_ATTRLIST', None)
|
|
|
- AUTH_LDAP_USER_ATTR_MAP = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_ATTR_MAP', {})
|
|
|
- AUTH_LDAP_USER_DN_TEMPLATE = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_DN_TEMPLATE', None)
|
|
|
- AUTH_LDAP_USER_FLAGS_BY_GROUP = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_FLAGS_BY_GROUP', {})
|
|
|
- AUTH_LDAP_USER_SEARCH = getattr(LDAP_CONFIG, 'AUTH_LDAP_USER_SEARCH', None)
|
|
|
-
|
|
|
- # Optionally disable strict certificate checking
|
|
|
- if getattr(LDAP_CONFIG, 'LDAP_IGNORE_CERT_ERRORS', False):
|
|
|
- ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_NEVER)
|
|
|
-
|
|
|
- # Prepend LDAPBackend to the authentication backends list
|
|
|
- AUTHENTICATION_BACKENDS.insert(0, 'django_auth_ldap.backend.LDAPBackend')
|
|
|
-
|
|
|
- # Enable logging for django_auth_ldap
|
|
|
- ldap_logger = logging.getLogger('django_auth_ldap')
|
|
|
- ldap_logger.addHandler(logging.StreamHandler())
|
|
|
- ldap_logger.setLevel(logging.DEBUG)
|
|
|
-
|
|
|
-
|
|
|
#
|
|
|
# Caching
|
|
|
#
|