488 lines
16 KiB
Python
488 lines
16 KiB
Python
"""root settings for authentik"""
|
|
|
|
import importlib
|
|
import logging
|
|
import os
|
|
import sys
|
|
from hashlib import sha512
|
|
from json import dumps
|
|
from time import time
|
|
from urllib.parse import quote_plus
|
|
|
|
import structlog
|
|
from celery.schedules import crontab
|
|
from sentry_sdk import set_tag
|
|
|
|
from authentik import ENV_GIT_HASH_KEY, __version__
|
|
from authentik.lib.config import CONFIG
|
|
from authentik.lib.logging import add_process_id
|
|
from authentik.lib.sentry import sentry_init
|
|
from authentik.lib.utils.reflection import get_env
|
|
from authentik.stages.password import BACKEND_APP_PASSWORD, BACKEND_INBUILT, BACKEND_LDAP
|
|
|
|
|
|
def j_print(event: str, log_level: str = "info", **kwargs):
|
|
"""Print event in the same format as structlog with JSON.
|
|
Used before structlog is configured."""
|
|
data = {
|
|
"event": event,
|
|
"level": log_level,
|
|
"logger": __name__,
|
|
"timestamp": time(),
|
|
}
|
|
data.update(**kwargs)
|
|
print(dumps(data), file=sys.stderr)
|
|
|
|
|
|
LOGGER = structlog.get_logger()
|
|
|
|
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
|
BASE_DIR = os.path.dirname(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
|
STATIC_ROOT = BASE_DIR + "/static"
|
|
STATICFILES_DIRS = [BASE_DIR + "/web"]
|
|
MEDIA_ROOT = BASE_DIR + "/media"
|
|
|
|
DEBUG = CONFIG.y_bool("debug")
|
|
SECRET_KEY = CONFIG.y("secret_key")
|
|
|
|
INTERNAL_IPS = ["127.0.0.1"]
|
|
ALLOWED_HOSTS = ["*"]
|
|
SECURE_PROXY_SSL_HEADER = ("HTTP_X_FORWARDED_PROTO", "https")
|
|
SECURE_CROSS_ORIGIN_OPENER_POLICY = None
|
|
LOGIN_URL = "authentik_flows:default-authentication"
|
|
|
|
# Custom user model
|
|
AUTH_USER_MODEL = "authentik_core.User"
|
|
|
|
CSRF_COOKIE_NAME = "authentik_csrf"
|
|
CSRF_HEADER_NAME = "HTTP_X_AUTHENTIK_CSRF"
|
|
LANGUAGE_COOKIE_NAME = "authentik_language"
|
|
SESSION_COOKIE_NAME = "authentik_session"
|
|
SESSION_COOKIE_DOMAIN = CONFIG.y("cookie_domain", None)
|
|
|
|
AUTHENTICATION_BACKENDS = [
|
|
"django.contrib.auth.backends.ModelBackend",
|
|
BACKEND_INBUILT,
|
|
BACKEND_APP_PASSWORD,
|
|
BACKEND_LDAP,
|
|
"guardian.backends.ObjectPermissionBackend",
|
|
]
|
|
|
|
DEFAULT_AUTO_FIELD = "django.db.models.AutoField"
|
|
|
|
# Application definition
|
|
INSTALLED_APPS = [
|
|
"django.contrib.auth",
|
|
"django.contrib.contenttypes",
|
|
"django.contrib.sessions",
|
|
"django.contrib.messages",
|
|
"django.contrib.staticfiles",
|
|
"django.contrib.humanize",
|
|
"authentik.admin",
|
|
"authentik.api",
|
|
"authentik.crypto",
|
|
"authentik.events",
|
|
"authentik.flows",
|
|
"authentik.lib",
|
|
"authentik.outposts",
|
|
"authentik.policies.dummy",
|
|
"authentik.policies.event_matcher",
|
|
"authentik.policies.expiry",
|
|
"authentik.policies.expression",
|
|
"authentik.policies.hibp",
|
|
"authentik.policies.password",
|
|
"authentik.policies.reputation",
|
|
"authentik.policies",
|
|
"authentik.providers.ldap",
|
|
"authentik.providers.oauth2",
|
|
"authentik.providers.proxy",
|
|
"authentik.providers.saml",
|
|
"authentik.recovery",
|
|
"authentik.sources.ldap",
|
|
"authentik.sources.oauth",
|
|
"authentik.sources.plex",
|
|
"authentik.sources.saml",
|
|
"authentik.stages.authenticator_duo",
|
|
"authentik.stages.authenticator_sms",
|
|
"authentik.stages.authenticator_static",
|
|
"authentik.stages.authenticator_totp",
|
|
"authentik.stages.authenticator_validate",
|
|
"authentik.stages.authenticator_webauthn",
|
|
"authentik.stages.captcha",
|
|
"authentik.stages.consent",
|
|
"authentik.stages.deny",
|
|
"authentik.stages.dummy",
|
|
"authentik.stages.email",
|
|
"authentik.stages.identification",
|
|
"authentik.stages.invitation",
|
|
"authentik.stages.password",
|
|
"authentik.stages.prompt",
|
|
"authentik.stages.user_delete",
|
|
"authentik.stages.user_login",
|
|
"authentik.stages.user_logout",
|
|
"authentik.stages.user_write",
|
|
"authentik.tenants",
|
|
"authentik.blueprints",
|
|
"rest_framework",
|
|
"django_filters",
|
|
"drf_spectacular",
|
|
"guardian",
|
|
"django_prometheus",
|
|
"channels",
|
|
]
|
|
|
|
GUARDIAN_MONKEY_PATCH = False
|
|
|
|
SPECTACULAR_SETTINGS = {
|
|
"TITLE": "authentik",
|
|
"DESCRIPTION": "Making authentication simple.",
|
|
"VERSION": __version__,
|
|
"COMPONENT_SPLIT_REQUEST": True,
|
|
"SCHEMA_PATH_PREFIX": "/api/v([0-9]+(beta)?)",
|
|
"SCHEMA_PATH_PREFIX_TRIM": True,
|
|
"SERVERS": [
|
|
{
|
|
"url": "/api/v3/",
|
|
},
|
|
],
|
|
"CONTACT": {
|
|
"email": "hello@goauthentik.io",
|
|
},
|
|
"AUTHENTICATION_WHITELIST": ["authentik.api.authentication.TokenAuthentication"],
|
|
"LICENSE": {
|
|
"name": "GNU GPLv3",
|
|
"url": "https://github.com/goauthentik/authentik/blob/main/LICENSE",
|
|
},
|
|
"ENUM_NAME_OVERRIDES": {
|
|
"EventActions": "authentik.events.models.EventAction",
|
|
"ChallengeChoices": "authentik.flows.challenge.ChallengeTypes",
|
|
"FlowDesignationEnum": "authentik.flows.models.FlowDesignation",
|
|
"PolicyEngineMode": "authentik.policies.models.PolicyEngineMode",
|
|
"ProxyMode": "authentik.providers.proxy.models.ProxyMode",
|
|
"PromptTypeEnum": "authentik.stages.prompt.models.FieldTypes",
|
|
"LDAPAPIAccessMode": "authentik.providers.ldap.models.APIAccessMode",
|
|
},
|
|
"ENUM_ADD_EXPLICIT_BLANK_NULL_CHOICE": False,
|
|
"POSTPROCESSING_HOOKS": [
|
|
"authentik.api.schema.postprocess_schema_responses",
|
|
"drf_spectacular.hooks.postprocess_schema_enums",
|
|
],
|
|
}
|
|
|
|
REST_FRAMEWORK = {
|
|
"DEFAULT_PAGINATION_CLASS": "authentik.api.pagination.Pagination",
|
|
"PAGE_SIZE": 100,
|
|
"DEFAULT_FILTER_BACKENDS": [
|
|
"rest_framework_guardian.filters.ObjectPermissionsFilter",
|
|
"django_filters.rest_framework.DjangoFilterBackend",
|
|
"rest_framework.filters.OrderingFilter",
|
|
"rest_framework.filters.SearchFilter",
|
|
],
|
|
"DEFAULT_PARSER_CLASSES": [
|
|
"rest_framework.parsers.JSONParser",
|
|
],
|
|
"DEFAULT_PERMISSION_CLASSES": ("rest_framework.permissions.DjangoObjectPermissions",),
|
|
"DEFAULT_AUTHENTICATION_CLASSES": (
|
|
"authentik.api.authentication.TokenAuthentication",
|
|
"rest_framework.authentication.SessionAuthentication",
|
|
),
|
|
"DEFAULT_RENDERER_CLASSES": [
|
|
"rest_framework.renderers.JSONRenderer",
|
|
],
|
|
"DEFAULT_SCHEMA_CLASS": "drf_spectacular.openapi.AutoSchema",
|
|
"TEST_REQUEST_DEFAULT_FORMAT": "json",
|
|
}
|
|
|
|
REDIS_PROTOCOL_PREFIX = "redis://"
|
|
REDIS_CELERY_TLS_REQUIREMENTS = ""
|
|
if CONFIG.y_bool("redis.tls", False):
|
|
REDIS_PROTOCOL_PREFIX = "rediss://"
|
|
REDIS_CELERY_TLS_REQUIREMENTS = f"?ssl_cert_reqs={CONFIG.y('redis.tls_reqs')}"
|
|
_redis_url = (
|
|
f"{REDIS_PROTOCOL_PREFIX}:"
|
|
f"{quote_plus(CONFIG.y('redis.password'))}@{quote_plus(CONFIG.y('redis.host'))}:"
|
|
f"{int(CONFIG.y('redis.port'))}"
|
|
)
|
|
|
|
CACHES = {
|
|
"default": {
|
|
"BACKEND": "django_redis.cache.RedisCache",
|
|
"LOCATION": f"{_redis_url}/{CONFIG.y('redis.cache_db')}",
|
|
"TIMEOUT": int(CONFIG.y("redis.cache_timeout", 300)),
|
|
"OPTIONS": {"CLIENT_CLASS": "django_redis.client.DefaultClient"},
|
|
}
|
|
}
|
|
DJANGO_REDIS_SCAN_ITERSIZE = 1000
|
|
DJANGO_REDIS_IGNORE_EXCEPTIONS = True
|
|
DJANGO_REDIS_LOG_IGNORED_EXCEPTIONS = True
|
|
SESSION_ENGINE = "django.contrib.sessions.backends.cache"
|
|
SESSION_SERIALIZER = "django.contrib.sessions.serializers.PickleSerializer"
|
|
SESSION_CACHE_ALIAS = "default"
|
|
# Configured via custom SessionMiddleware
|
|
# SESSION_COOKIE_SAMESITE = "None"
|
|
# SESSION_COOKIE_SECURE = True
|
|
SESSION_EXPIRE_AT_BROWSER_CLOSE = True
|
|
|
|
MESSAGE_STORAGE = "authentik.root.messages.storage.ChannelsStorage"
|
|
|
|
MIDDLEWARE = [
|
|
"authentik.root.middleware.LoggingMiddleware",
|
|
"django_prometheus.middleware.PrometheusBeforeMiddleware",
|
|
"authentik.root.middleware.SessionMiddleware",
|
|
"django.contrib.auth.middleware.AuthenticationMiddleware",
|
|
"authentik.core.middleware.RequestIDMiddleware",
|
|
"authentik.tenants.middleware.TenantMiddleware",
|
|
"authentik.events.middleware.AuditMiddleware",
|
|
"django.middleware.security.SecurityMiddleware",
|
|
"django.middleware.common.CommonMiddleware",
|
|
"django.middleware.csrf.CsrfViewMiddleware",
|
|
"django.contrib.messages.middleware.MessageMiddleware",
|
|
"django.middleware.clickjacking.XFrameOptionsMiddleware",
|
|
"authentik.core.middleware.ImpersonateMiddleware",
|
|
"django_prometheus.middleware.PrometheusAfterMiddleware",
|
|
]
|
|
|
|
ROOT_URLCONF = "authentik.root.urls"
|
|
|
|
TEMPLATES = [
|
|
{
|
|
"BACKEND": "django.template.backends.django.DjangoTemplates",
|
|
"DIRS": ["/templates"],
|
|
"APP_DIRS": True,
|
|
"OPTIONS": {
|
|
"context_processors": [
|
|
"django.template.context_processors.debug",
|
|
"django.template.context_processors.request",
|
|
"django.contrib.auth.context_processors.auth",
|
|
"django.contrib.messages.context_processors.messages",
|
|
"authentik.tenants.utils.context_processor",
|
|
],
|
|
},
|
|
},
|
|
]
|
|
|
|
ASGI_APPLICATION = "authentik.root.asgi.application"
|
|
|
|
CHANNEL_LAYERS = {
|
|
"default": {
|
|
"BACKEND": "channels_redis.core.RedisChannelLayer",
|
|
"CONFIG": {
|
|
"hosts": [f"{_redis_url}/{CONFIG.y('redis.ws_db')}"],
|
|
},
|
|
},
|
|
}
|
|
|
|
|
|
# Database
|
|
# https://docs.djangoproject.com/en/2.1/ref/settings/#databases
|
|
|
|
DATABASES = {
|
|
"default": {
|
|
"ENGINE": "django_prometheus.db.backends.postgresql",
|
|
"HOST": CONFIG.y("postgresql.host"),
|
|
"NAME": CONFIG.y("postgresql.name"),
|
|
"USER": CONFIG.y("postgresql.user"),
|
|
"PASSWORD": CONFIG.y("postgresql.password"),
|
|
"PORT": int(CONFIG.y("postgresql.port")),
|
|
}
|
|
}
|
|
|
|
# Email
|
|
EMAIL_HOST = CONFIG.y("email.host")
|
|
EMAIL_PORT = int(CONFIG.y("email.port"))
|
|
EMAIL_HOST_USER = CONFIG.y("email.username")
|
|
EMAIL_HOST_PASSWORD = CONFIG.y("email.password")
|
|
EMAIL_USE_TLS = CONFIG.y_bool("email.use_tls", False)
|
|
EMAIL_USE_SSL = CONFIG.y_bool("email.use_ssl", False)
|
|
EMAIL_TIMEOUT = int(CONFIG.y("email.timeout"))
|
|
DEFAULT_FROM_EMAIL = CONFIG.y("email.from")
|
|
SERVER_EMAIL = DEFAULT_FROM_EMAIL
|
|
EMAIL_SUBJECT_PREFIX = "[authentik] "
|
|
|
|
# Password validation
|
|
# https://docs.djangoproject.com/en/2.1/ref/settings/#auth-password-validators
|
|
|
|
AUTH_PASSWORD_VALIDATORS = [
|
|
{
|
|
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator",
|
|
},
|
|
{"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator"},
|
|
{"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator"},
|
|
{"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator"},
|
|
]
|
|
|
|
|
|
# Internationalization
|
|
# https://docs.djangoproject.com/en/2.1/topics/i18n/
|
|
|
|
LANGUAGE_CODE = "en-us"
|
|
|
|
TIME_ZONE = "UTC"
|
|
|
|
USE_I18N = True
|
|
|
|
USE_TZ = True
|
|
|
|
LOCALE_PATHS = ["./locale"]
|
|
|
|
# Celery settings
|
|
# Add a 10 minute timeout to all Celery tasks.
|
|
CELERY_TASK_SOFT_TIME_LIMIT = 600
|
|
CELERY_WORKER_MAX_TASKS_PER_CHILD = 50
|
|
CELERY_BEAT_SCHEDULE = {
|
|
"clean_expired_models": {
|
|
"task": "authentik.core.tasks.clean_expired_models",
|
|
"schedule": crontab(minute="2-59/5"),
|
|
"options": {"queue": "authentik_scheduled"},
|
|
},
|
|
"user_cleanup": {
|
|
"task": "authentik.core.tasks.clean_temporary_users",
|
|
"schedule": crontab(minute="9-59/5"),
|
|
"options": {"queue": "authentik_scheduled"},
|
|
},
|
|
}
|
|
CELERY_TASK_CREATE_MISSING_QUEUES = True
|
|
CELERY_TASK_DEFAULT_QUEUE = "authentik"
|
|
CELERY_BROKER_URL = (
|
|
f"{_redis_url}/{CONFIG.y('redis.message_queue_db')}{REDIS_CELERY_TLS_REQUIREMENTS}"
|
|
)
|
|
CELERY_RESULT_BACKEND = (
|
|
f"{_redis_url}/{CONFIG.y('redis.message_queue_db')}{REDIS_CELERY_TLS_REQUIREMENTS}"
|
|
)
|
|
|
|
# Sentry integration
|
|
env = get_env()
|
|
_ERROR_REPORTING = CONFIG.y_bool("error_reporting.enabled", False)
|
|
if _ERROR_REPORTING:
|
|
sentry_env = CONFIG.y("error_reporting.environment", "customer")
|
|
sentry_init()
|
|
set_tag("authentik.uuid", sha512(str(SECRET_KEY).encode("ascii")).hexdigest()[:16])
|
|
|
|
|
|
# Static files (CSS, JavaScript, Images)
|
|
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
|
|
|
STATIC_URL = "/static/"
|
|
MEDIA_URL = "/media/"
|
|
|
|
TEST = False
|
|
TEST_RUNNER = "authentik.root.test_runner.PytestTestRunner"
|
|
# We can't check TEST here as its set later by the test runner
|
|
LOG_LEVEL = CONFIG.y("log_level").upper() if "TF_BUILD" not in os.environ else "DEBUG"
|
|
# We could add a custom level to stdlib logging and structlog, but it's not easy or clean
|
|
# https://stackoverflow.com/questions/54505487/custom-log-level-not-working-with-structlog
|
|
# Additionally, the entire code uses debug as highest level so that would have to be re-written too
|
|
if LOG_LEVEL == "TRACE":
|
|
LOG_LEVEL = "DEBUG"
|
|
|
|
structlog.configure_once(
|
|
processors=[
|
|
structlog.stdlib.add_log_level,
|
|
structlog.stdlib.add_logger_name,
|
|
structlog.contextvars.merge_contextvars,
|
|
add_process_id,
|
|
structlog.stdlib.PositionalArgumentsFormatter(),
|
|
structlog.processors.TimeStamper(fmt="iso", utc=False),
|
|
structlog.processors.StackInfoRenderer(),
|
|
structlog.processors.dict_tracebacks,
|
|
structlog.stdlib.ProcessorFormatter.wrap_for_formatter,
|
|
],
|
|
logger_factory=structlog.stdlib.LoggerFactory(),
|
|
wrapper_class=structlog.make_filtering_bound_logger(
|
|
getattr(logging, LOG_LEVEL, logging.WARNING)
|
|
),
|
|
cache_logger_on_first_use=True,
|
|
)
|
|
|
|
LOG_PRE_CHAIN = [
|
|
# Add the log level and a timestamp to the event_dict if the log entry
|
|
# is not from structlog.
|
|
structlog.stdlib.add_log_level,
|
|
structlog.stdlib.add_logger_name,
|
|
structlog.processors.TimeStamper(),
|
|
structlog.processors.StackInfoRenderer(),
|
|
]
|
|
|
|
LOGGING = {
|
|
"version": 1,
|
|
"disable_existing_loggers": False,
|
|
"formatters": {
|
|
"json": {
|
|
"()": structlog.stdlib.ProcessorFormatter,
|
|
"processor": structlog.processors.JSONRenderer(sort_keys=True),
|
|
"foreign_pre_chain": LOG_PRE_CHAIN,
|
|
},
|
|
"console": {
|
|
"()": structlog.stdlib.ProcessorFormatter,
|
|
"processor": structlog.dev.ConsoleRenderer(colors=DEBUG),
|
|
"foreign_pre_chain": LOG_PRE_CHAIN,
|
|
},
|
|
},
|
|
"handlers": {
|
|
"console": {
|
|
"level": "DEBUG",
|
|
"class": "logging.StreamHandler",
|
|
"formatter": "console" if DEBUG else "json",
|
|
},
|
|
},
|
|
"loggers": {},
|
|
}
|
|
|
|
_LOGGING_HANDLER_MAP = {
|
|
"": LOG_LEVEL,
|
|
"authentik": LOG_LEVEL,
|
|
"django": "WARNING",
|
|
"celery": "WARNING",
|
|
"selenium": "WARNING",
|
|
"docker": "WARNING",
|
|
"urllib3": "WARNING",
|
|
"websockets": "WARNING",
|
|
"daphne": "WARNING",
|
|
"kubernetes": "INFO",
|
|
"asyncio": "WARNING",
|
|
"aioredis": "WARNING",
|
|
"silk": "INFO",
|
|
}
|
|
for handler_name, level in _LOGGING_HANDLER_MAP.items():
|
|
# pyright: reportGeneralTypeIssues=false
|
|
LOGGING["loggers"][handler_name] = {
|
|
"handlers": ["console"],
|
|
"level": level,
|
|
"propagate": False,
|
|
}
|
|
|
|
|
|
_DISALLOWED_ITEMS = [
|
|
"INSTALLED_APPS",
|
|
"MIDDLEWARE",
|
|
"AUTHENTICATION_BACKENDS",
|
|
"CELERY_BEAT_SCHEDULE",
|
|
]
|
|
# Load subapps's INSTALLED_APPS
|
|
for _app in INSTALLED_APPS:
|
|
if _app.startswith("authentik"):
|
|
if "apps" in _app:
|
|
_app = ".".join(_app.split(".")[:-2])
|
|
try:
|
|
app_settings = importlib.import_module(f"{_app}.settings")
|
|
INSTALLED_APPS.extend(getattr(app_settings, "INSTALLED_APPS", []))
|
|
MIDDLEWARE.extend(getattr(app_settings, "MIDDLEWARE", []))
|
|
AUTHENTICATION_BACKENDS.extend(getattr(app_settings, "AUTHENTICATION_BACKENDS", []))
|
|
CELERY_BEAT_SCHEDULE.update(getattr(app_settings, "CELERY_BEAT_SCHEDULE", {}))
|
|
for _attr in dir(app_settings):
|
|
if not _attr.startswith("__") and _attr not in _DISALLOWED_ITEMS:
|
|
globals()[_attr] = getattr(app_settings, _attr)
|
|
except ImportError:
|
|
pass
|
|
|
|
if DEBUG:
|
|
CELERY_TASK_ALWAYS_EAGER = True
|
|
os.environ[ENV_GIT_HASH_KEY] = "dev"
|
|
INSTALLED_APPS.append("silk")
|
|
SILKY_PYTHON_PROFILER = True
|
|
MIDDLEWARE = ["silk.middleware.SilkyMiddleware"] + MIDDLEWARE
|
|
|
|
INSTALLED_APPS.append("authentik.core")
|
|
|
|
j_print("Booting authentik", version=__version__)
|