|
31 | 31 | LEMUR_TOKEN_SECRETS = [LEMUR_TOKEN_SECRET] |
32 | 32 | LEMUR_ENCRYPTION_KEYS = ['Q7AzDsZHJRaKdS4Obeb4bLw6tYRdTqQD24xHQqJbA4A='] |
33 | 33 |
|
| 34 | + |
| 35 | +OAUTH2_SECRET = 'd105a7b3f365423a08917fa0455b353fce966e955c3a6e88f8ff149fac301a03' |
| 36 | + |
| 37 | +# this is the secret used to generate oauth state tokens |
| 38 | +OAUTH_STATE_TOKEN_SECRET = b'jhyNmgizEixQRnWL8F9yTfGlKz3pp2ks2GGxAUoFYE8=' |
| 39 | + |
34 | 40 | # REQUIRED |
35 | 41 | # Certificate Defaults |
36 | 42 | LEMUR_DEFAULT_COUNTRY = "" |
|
40 | 46 | LEMUR_DEFAULT_ORGANIZATIONAL_UNIT = "" |
41 | 47 | LEMUR_SECURITY_TEAM_EMAIL = ["admin@localhost"] |
42 | 48 |
|
| 49 | +DIGICERT_CIS_API_KEY="" |
| 50 | +DIGICERT_API_KEY="" |
| 51 | +ENTRUST_API_USER="" |
| 52 | +GOOGLE_APPLICATION_CREDENTIALS="" |
| 53 | +DIGICERT_CIS_URL="" |
| 54 | +DIGICERT_URL="" |
| 55 | +ENTRUST_API_PASS="" |
| 56 | +DIGICERT_CIS_ROOTS="" |
| 57 | +DIGICERT_ORG_ID="" |
| 58 | +ENTRUST_URL="" |
| 59 | +DIGICERT_CIS_PROFILE_NAMES="" |
| 60 | +DIGICERT_ORDER_TYPE="" |
| 61 | +ENTRUST_ROOT="" |
| 62 | +ENTRUST_NAME="" |
| 63 | +DIGICERT_ROOT="" |
| 64 | +ENTRUST_EMAIL="" |
| 65 | +ENTRUST_PHONE="" |
| 66 | + |
| 67 | + |
43 | 68 | # Database settings |
44 | 69 | SQLALCHEMY_DATABASE_URI = environ.get('SQLALCHEMY_DATABASE_URI', 'postgresql://lemur:lemur@localhost:5432/lemur') |
45 | 70 | # SQLALCHEMY_ENABLE_FLASK_REPLICATED = False |
|
77 | 102 | # VERISIGN_LAST_NAME = "" |
78 | 103 | # VERSIGN_EMAIL = "" |
79 | 104 |
|
80 | | -IDP_GROUPS_KEYS = ["googleGroups"] # a list of keys used by IDP(s) to return user groups (profile[IDP_GROUPS_KEY]) |
81 | | -# Note that prefix/suffix can be commented out or set to "" if no filtering against naming convention is desired |
82 | | -# IDP_ROLES_PREFIX = "PREFIX-" # prefix for all IDP-defined roles, used to match naming conventions |
83 | | -# IDP_ROLES_SUFFIX = "_SUFFIX" # suffix for all IDP-defined roles, used to match naming conventions |
84 | | -# IDP_ROLES_DESCRIPTION = "Automatically generated role" # Description to attach to automatically generated roles |
85 | | -# IDP_ROLES_MAPPING = {} # Dictionary that matches the IDP group name to the Lemur role. The Lemur role must exist. |
86 | | -# Example: IDP_ROLES_MAPPING = {"security": "admin", "engineering": "operator", "jane_from_accounting": "read-only"} |
87 | | -IDP_ASSIGN_ROLES_FROM_USER_GROUPS = True # Assigns a Lemur role for each group found attached to the user |
88 | | -IDP_CREATE_ROLES_FROM_USER_GROUPS = True # Creates a Lemur role for each group found attached to the user if missing |
89 | | -# Protects the built-in groups and prevents dynamically assigning users to them. Prevents IDP admin from becoming |
90 | | -# Lemur admin. Use IDP_ROLES_MAPPING to create a mapping to assign these groups if desired. eg {"admin": "admin"} |
91 | | -IDP_PROTECT_BUILTINS = True |
92 | | -IDP_CREATE_PER_USER_ROLE = True # Generates Lemur role for each user (allows cert assignment to a single user) |
93 | | - |
94 | | -# # this is the secret used to generate oauth state tokens |
95 | | -# OAUTH_STATE_TOKEN_SECRET = repr(environ.get('OAUTH_STATE_TOKEN_SECRET', '') |
| 105 | +# IDP_GROUPS_KEYS = ["googleGroups"] # a list of keys used by IDP(s) to return user groups (profile[IDP_GROUPS_KEY]) |
| 106 | +# # Note that prefix/suffix can be commented out or set to "" if no filtering against naming convention is desired |
| 107 | +# # IDP_ROLES_PREFIX = "PREFIX-" # prefix for all IDP-defined roles, used to match naming conventions |
| 108 | +# # IDP_ROLES_SUFFIX = "_SUFFIX" # suffix for all IDP-defined roles, used to match naming conventions |
| 109 | +# # IDP_ROLES_DESCRIPTION = "Automatically generated role" # Description to attach to automatically generated roles |
| 110 | +# # IDP_ROLES_MAPPING = {} # Dictionary that matches the IDP group name to the Lemur role. The Lemur role must exist. |
| 111 | +# # Example: IDP_ROLES_MAPPING = {"security": "admin", "engineering": "operator", "jane_from_accounting": "read-only"} |
| 112 | +# IDP_ASSIGN_ROLES_FROM_USER_GROUPS = True # Assigns a Lemur role for each group found attached to the user |
| 113 | +# IDP_CREATE_ROLES_FROM_USER_GROUPS = True # Creates a Lemur role for each group found attached to the user if missing |
| 114 | +# # Protects the built-in groups and prevents dynamically assigning users to them. Prevents IDP admin from becoming |
| 115 | +# # Lemur admin. Use IDP_ROLES_MAPPING to create a mapping to assign these groups if desired. eg {"admin": "admin"} |
| 116 | +# IDP_PROTECT_BUILTINS = True |
| 117 | +# IDP_CREATE_PER_USER_ROLE = True # Generates Lemur role for each user (allows cert assignment to a single user) |
96 | 118 |
|
97 | 119 | # REDIS_HOST = 'redis' |
98 | 120 | # REDIS_PORT = 6379 |
|
0 commit comments