2020-02-01 23:58:10 +00:00
|
|
|
|
# Spaceport secrets file, don't commit to version control!
|
|
|
|
|
|
2020-05-07 04:18:42 +00:00
|
|
|
|
# /admin/ route obfuscation
|
|
|
|
|
# Set this to random characters
|
|
|
|
|
# For example, use the output of this:
|
|
|
|
|
# head /dev/urandom | base32 | head -c 16
|
|
|
|
|
ADMIN_RANDOM = ''
|
|
|
|
|
|
2020-02-02 04:42:46 +00:00
|
|
|
|
# /ipn/ route obfuscation
|
|
|
|
|
# Set this to random characters
|
2020-02-01 23:58:10 +00:00
|
|
|
|
# For example, use the output of this:
|
2020-02-02 04:42:46 +00:00
|
|
|
|
# head /dev/urandom | base32 | head -c 16
|
2020-02-01 23:58:10 +00:00
|
|
|
|
IPN_RANDOM = ''
|
2020-02-02 04:42:46 +00:00
|
|
|
|
|
2020-06-10 21:14:43 +00:00
|
|
|
|
# Registration bypass code
|
|
|
|
|
# Allows people to register outside of protospace
|
|
|
|
|
# Set this to random characters
|
|
|
|
|
# For example, use the output of this:
|
|
|
|
|
# head /dev/urandom | base32 | head -c 16
|
|
|
|
|
REGISTRATION_BYPASS = ''
|
|
|
|
|
|
2020-02-02 04:42:46 +00:00
|
|
|
|
# Django secret key
|
|
|
|
|
# Set this to random characters
|
|
|
|
|
# For example, use the output of this:
|
|
|
|
|
# head /dev/urandom | base64 | head -c 50
|
|
|
|
|
DJANGO_SECRET_KEY = ''
|
|
|
|
|
# Warning
|
|
|
|
|
# Keep this value secret.
|
|
|
|
|
# Running Django with a known SECRET_KEY defeats many of Django’s security
|
|
|
|
|
# protections, and can lead to privilege escalation and remote code execution
|
|
|
|
|
# vulnerabilities.
|
2020-02-08 02:22:29 +00:00
|
|
|
|
|
|
|
|
|
# LDAP API url
|
|
|
|
|
# should contain the IP and port of the script and machine connected over VPN
|
|
|
|
|
# with trailing slash
|
|
|
|
|
LDAP_API_URL = ''
|
|
|
|
|
|
|
|
|
|
# LDAP API key
|
|
|
|
|
# should be equal to the auth token value set in
|
|
|
|
|
# spaceport/ldapserver/secrets.py
|
|
|
|
|
LDAP_API_KEY = ''
|
2020-02-19 23:58:02 +00:00
|
|
|
|
|
2020-09-16 22:52:17 +00:00
|
|
|
|
# Auth API url
|
|
|
|
|
# should contain the IP and port of the script and machine connected over VPN
|
|
|
|
|
# with trailing slash
|
|
|
|
|
AUTH_API_URL = ''
|
|
|
|
|
|
|
|
|
|
# Auth API key
|
|
|
|
|
# should be equal to the auth token value set in
|
|
|
|
|
# spaceport/authserver/secrets.py
|
|
|
|
|
AUTH_API_KEY = ''
|
|
|
|
|
|
2020-02-27 22:44:55 +00:00
|
|
|
|
# Door cards API token
|
|
|
|
|
# Set this to random characters
|
|
|
|
|
# For example, use the output of this:
|
|
|
|
|
# head /dev/urandom | base32 | head -c 40
|
|
|
|
|
DOOR_API_TOKEN = ''
|
|
|
|
|
|
2020-02-29 00:49:58 +00:00
|
|
|
|
# Protospace general info
|
|
|
|
|
DOOR_CODE = ''
|
|
|
|
|
WIFI_PASS = ''
|
2020-04-21 00:12:28 +00:00
|
|
|
|
MINECRAFT = ''
|
2020-10-31 22:53:44 +00:00
|
|
|
|
MUMBLE = ''
|
2020-02-29 00:49:58 +00:00
|
|
|
|
|
2020-06-19 23:49:05 +00:00
|
|
|
|
# Portal Email Credentials
|
|
|
|
|
# For sending password resets, etc.
|
|
|
|
|
EMAIL_USER = ''
|
|
|
|
|
EMAIL_PASS = ''
|
|
|
|
|
|
|
|
|
|
|
2020-02-19 23:58:02 +00:00
|
|
|
|
# Backup API tokens
|
|
|
|
|
# These tokens allow each user to download a backup of member data.
|
|
|
|
|
# Don't mess up the data structure!
|
|
|
|
|
# Tokens must be random and unique, use the output of:
|
|
|
|
|
# head /dev/urandom | base32 | head -c 40
|
|
|
|
|
BACKUP_TOKENS = {
|
|
|
|
|
'<token>': {
|
2021-04-15 23:30:16 +00:00
|
|
|
|
'name': 'firstname.lastname',
|
2020-02-19 23:58:02 +00:00
|
|
|
|
'backup_id': '<token>',
|
|
|
|
|
'cache_key': '<token>',
|
|
|
|
|
},
|
|
|
|
|
'<token>': {
|
2021-04-15 23:30:16 +00:00
|
|
|
|
'name': 'firstname.lastname',
|
|
|
|
|
'backup_id': '<token>',
|
|
|
|
|
'cache_key': '<token>',
|
|
|
|
|
},
|
|
|
|
|
'<token>': { # reset the canaries for data-at-rest
|
|
|
|
|
'name': 'null',
|
2020-02-19 23:58:02 +00:00
|
|
|
|
'backup_id': '<token>',
|
|
|
|
|
'cache_key': '<token>',
|
|
|
|
|
},
|
|
|
|
|
}
|