Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 949266 Details for
Bug 1155112
after code introduction to prevent clear text PW, now no logging occurs
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
/etc/openstack-dashboard/local_settings
local_settings (text/plain), 16.22 KB, created by
Mike Abrams
on 2014-10-22 07:25:23 UTC
(
hide
)
Description:
/etc/openstack-dashboard/local_settings
Filename:
MIME Type:
Creator:
Mike Abrams
Created:
2014-10-22 07:25:23 UTC
Size:
16.22 KB
patch
obsolete
>import os > >from django.utils.translation import ugettext_lazy as _ > >from openstack_dashboard import exceptions > >DEBUG = True >TEMPLATE_DEBUG = DEBUG > ># Required for Django 1.5. ># If horizon is running in production (DEBUG is False), set this ># with the list of host/domain names that the application can serve. ># For more information see: ># https://docs.djangoproject.com/en/dev/ref/settings/#allowed-hosts >#ALLOWED_HOSTS = ['horizon.example.com', ] > >ALLOWED_HOSTS = ['*', ] > > ># Set SSL proxy settings: ># For Django 1.4+ pass this header from the proxy after terminating the SSL, ># and don't forget to strip it from the client's request. ># For more information see: ># https://docs.djangoproject.com/en/1.4/ref/settings/#secure-proxy-ssl-header ># SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTOCOL', 'https') > ># If Horizon is being served through SSL, then uncomment the following two ># settings to better secure the cookies from security exploits >#CSRF_COOKIE_SECURE = True >#SESSION_COOKIE_SECURE = True > ># Overrides for OpenStack API versions. Use this setting to force the ># OpenStack dashboard to use a specfic API version for a given service API. ># NOTE: The version should be formatted as it appears in the URL for the ># service API. For example, The identity service APIs have inconsistent ># use of the decimal point, so valid options would be "2.0" or "3". ># OPENSTACK_API_VERSIONS = { ># "identity": 3 ># } > ># Set this to True if running on multi-domain model. When this is enabled, it ># will require user to enter the Domain name in addition to username for login. ># OPENSTACK_KEYSTONE_MULTIDOMAIN_SUPPORT = False > ># Overrides the default domain used when running on single-domain model ># with Keystone V3. All entities will be created in the default domain. ># OPENSTACK_KEYSTONE_DEFAULT_DOMAIN = 'Default' > ># Set Console type: ># valid options would be "AUTO", "VNC" or "SPICE" ># CONSOLE_TYPE = "AUTO" > ># Default OpenStack Dashboard configuration. >HORIZON_CONFIG = { > 'dashboards': ('project', 'admin', 'settings',), > 'default_dashboard': 'project', > 'user_home': 'openstack_dashboard.views.get_user_home', > 'ajax_queue_limit': 10, > 'auto_fade_alerts': { > 'delay': 3000, > 'fade_duration': 1500, > 'types': ['alert-success', 'alert-info'] > }, > 'help_url': "https://access.redhat.com/site/documentation//en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/index.html", > 'exceptions': {'recoverable': exceptions.RECOVERABLE, > 'not_found': exceptions.NOT_FOUND, > 'unauthorized': exceptions.UNAUTHORIZED}, >} > ># Specify a regular expression to validate user passwords. ># HORIZON_CONFIG["password_validator"] = { ># "regex": '.*', ># "help_text": _("Your password does not meet the requirements.") ># } > ># Disable simplified floating IP address management for deployments with ># multiple floating IP pools or complex network requirements. ># HORIZON_CONFIG["simple_ip_management"] = False > ># Turn off browser autocompletion for the login form if so desired. ># HORIZON_CONFIG["password_autocomplete"] = "off" > >LOCAL_PATH = os.path.dirname(os.path.abspath(__file__)) > ># Set custom secret key: ># You can either set it to a specific value or you can let horizion generate a ># default secret key that is unique on this machine, e.i. regardless of the ># amount of Python WSGI workers (if used behind Apache+mod_wsgi): However, there ># may be situations where you would want to set this explicitly, e.g. when ># multiple dashboard instances are distributed on different machines (usually ># behind a load-balancer). Either you have to make sure that a session gets all ># requests routed to the same dashboard instance or you set the same SECRET_KEY ># for all of them. ># from horizon.utils import secret_key ># SECRET_KEY = secret_key.generate_or_read_from_file(os.path.join(LOCAL_PATH, '.secret_key_store')) >SECRET_KEY = 'dc0e4af0c0bf4097a0caa71694241b68' > ># We recommend you use memcached for development; otherwise after every reload ># of the django development server, you will have to login again. To use ># memcached set CACHES to something like ># CACHES = { ># 'default': { ># 'BACKEND' : 'django.core.cache.backends.memcached.MemcachedCache', ># 'LOCATION' : '127.0.0.1:11211', ># } >#} > >CACHES = { > 'default': { > ># 'BACKEND': 'django.core.cache.backends.locmem.LocMemCache' > 'BACKEND': 'django.core.cache.backends.memcached.MemcachedCache', > 'LOCATION': '127.0.0.1:11211', > > } >} > ># Send email to the console by default >EMAIL_BACKEND = 'django.core.mail.backends.console.EmailBackend' ># Or send them to /dev/null >#EMAIL_BACKEND = 'django.core.mail.backends.dummy.EmailBackend' > ># Configure these for your outgoing email host ># EMAIL_HOST = 'smtp.my-company.com' ># EMAIL_PORT = 25 ># EMAIL_HOST_USER = 'djangomail' ># EMAIL_HOST_PASSWORD = 'top-secret!' > ># For multiple regions uncomment this configuration, and add (endpoint, title). > >OPENSTACK_KEYSTONE_URL = "http://10.35.117.4:5000/v2.0" >OPENSTACK_KEYSTONE_DEFAULT_ROLE = "_member_" > ># Disable SSL certificate checks (useful for self-signed certificates): ># OPENSTACK_SSL_NO_VERIFY = True > ># The CA certificate to use to verify SSL connections ># OPENSTACK_SSL_CACERT = '/path/to/cacert.pem' > ># The OPENSTACK_KEYSTONE_BACKEND settings can be used to identify the ># capabilities of the auth backend for Keystone. ># If Keystone has been configured to use LDAP as the auth backend then set ># can_edit_user to False and name to 'ldap'. ># ># TODO(tres): Remove these once Keystone has an API to identify auth backend. >OPENSTACK_KEYSTONE_BACKEND = { > 'name': 'native', > 'can_edit_user': True, > 'can_edit_group': True, > 'can_edit_project': True, > 'can_edit_domain': True, > 'can_edit_role': True >} > ># The OPENSTACK_HYPERVISOR_FEATURES settings can be used to enable optional ># services provided by hypervisors. >OPENSTACK_HYPERVISOR_FEATURES = { > 'can_set_mount_point': False, > 'can_set_password': False, >} > ># The OPENSTACK_NEUTRON_NETWORK settings can be used to enable optional ># services provided by neutron. Options currenly available are load ># balancer service, security groups, quotas, VPN service. >OPENSTACK_NEUTRON_NETWORK = { > 'enable_lb': False, > 'enable_firewall': False, > 'enable_quotas': True, > 'enable_security_group': True, > 'enable_vpn': False, > # The profile_support option is used to detect if an externa lrouter can be > # configured via the dashboard. When using specific plugins the > # profile_support can be turned on if needed. > #'profile_support': 'cisco', >} > ># The OPENSTACK_IMAGE_BACKEND settings can be used to customize features ># in the OpenStack Dashboard related to the Image service, such as the list ># of supported image formats. ># OPENSTACK_IMAGE_BACKEND = { ># 'image_formats': [ ># ('', ''), ># ('aki', _('AKI - Amazon Kernel Image')), ># ('ami', _('AMI - Amazon Machine Image')), ># ('ari', _('ARI - Amazon Ramdisk Image')), ># ('iso', _('ISO - Optical Disk Image')), ># ('qcow2', _('QCOW2 - QEMU Emulator')), ># ('raw', _('Raw')), ># ('vdi', _('VDI')), ># ('vhd', _('VHD')), ># ('vmdk', _('VMDK')) ># ] ># } > ># OPENSTACK_ENDPOINT_TYPE specifies the endpoint type to use for the endpoints ># in the Keystone service catalog. Use this setting when Horizon is running ># external to the OpenStack environment. The default is 'publicURL'. >#OPENSTACK_ENDPOINT_TYPE = "publicURL" > > ># SECONDARY_ENDPOINT_TYPE specifies the fallback endpoint type to use in the ># case that OPENSTACK_ENDPOINT_TYPE is not present in the endpoints ># in the Keystone service catalog. Use this setting when Horizon is running ># external to the OpenStack environment. The default is None. This ># value should differ from OPENSTACK_ENDPOINT_TYPE if used. >#SECONDARY_ENDPOINT_TYPE = "publicURL" > > ># The number of objects (Swift containers/objects or images) to display ># on a single page before providing a paging element (a "more" link) ># to paginate results. >API_RESULT_LIMIT = 1000 >API_RESULT_PAGE_SIZE = 20 > ># The timezone of the server. This should correspond with the timezone ># of your entire OpenStack installation, and hopefully be in UTC. >TIME_ZONE = "UTC" > ># If you have external monitoring links, eg: > > ># When launching an instance, the menu of available flavors is ># sorted by RAM usage, ascending. Provide a callback method here ># (and/or a flag for reverse sort) for the sorted() method if you'd ># like a different behaviour. For more info, see ># http://docs.python.org/2/library/functions.html#sorted ># CREATE_INSTANCE_FLAVOR_SORT = { ># 'key': my_awesome_callback_method, ># 'reverse': False, ># } > ># The Horizon Policy Enforcement engine uses these values to load per service ># policy rule files. The content of these files should match the files the ># OpenStack services are using to determine role based access control in the ># target installation. > ># Path to directory containing policy.json files >#POLICY_FILES_PATH = os.path.join(ROOT_PATH, "conf") > >POLICY_FILES_PATH = '/etc/openstack-dashboard' > ># Map of local copy of service policy files >#POLICY_FILES = { ># 'identity': 'keystone_policy.json', ># 'compute': 'nova_policy.json' >#} > ># Trove user and database extension support. By default support for ># creating users and databases on database instances is turned on. ># To disable these extensions set the permission here to something ># unusable such as ["!"]. ># TROVE_ADD_USER_PERMS = [] ># TROVE_ADD_DATABASE_PERMS = [] > >LOGGING = { > 'version': 1, > # When set to True this will disable all logging except > # for loggers specified in this configuration dictionary. Note that > # if nothing is specified here and disable_existing_loggers is True, > # django.db.backends will still log unless it is disabled explicitly. > 'disable_existing_loggers': False, > 'formatters': { > 'verbose': { > 'format': '%(asctime)s %(process)d %(levelname)s %(name)s ' > '%(message)s' > }, > }, > 'handlers': { > 'null': { > 'level': 'DEBUG', > 'class': 'django.utils.log.NullHandler', > }, > 'console': { > # Set the level to "DEBUG" for verbose output logging. > 'level': 'INFO', > 'class': 'logging.StreamHandler', > }, > 'file': { > 'level': 'DEBUG', > 'class': 'logging.FileHandler', > 'filename': '/var/log/horizon/horizon.log', > 'formatter': 'verbose', > }, > }, > 'loggers': { > # Logging from django.db.backends is VERY verbose, send to null > # by default. > 'django.db.backends': { > 'handlers': ['null'], > 'propagate': False, > }, > 'requests': { > 'handlers': ['null'], > 'propagate': False, > }, > 'horizon': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'openstack_dashboard': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'novaclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'cinderclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'keystoneclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'glanceclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'neutronclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'heatclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'ceilometerclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'troveclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'swiftclient': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'openstack_auth': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'nose.plugins.manager': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > 'django': { > # 'handlers': ['console'], > 'handlers': ['file'], > # 'level': 'DEBUG', > 'level': 'DEBUG', > 'propagate': False, > }, > } >} > >SECURITY_GROUP_RULES = { > 'all_tcp': { > 'name': 'ALL TCP', > 'ip_protocol': 'tcp', > 'from_port': '1', > 'to_port': '65535', > }, > 'all_udp': { > 'name': 'ALL UDP', > 'ip_protocol': 'udp', > 'from_port': '1', > 'to_port': '65535', > }, > 'all_icmp': { > 'name': 'ALL ICMP', > 'ip_protocol': 'icmp', > 'from_port': '-1', > 'to_port': '-1', > }, > 'ssh': { > 'name': 'SSH', > 'ip_protocol': 'tcp', > 'from_port': '22', > 'to_port': '22', > }, > 'smtp': { > 'name': 'SMTP', > 'ip_protocol': 'tcp', > 'from_port': '25', > 'to_port': '25', > }, > 'dns': { > 'name': 'DNS', > 'ip_protocol': 'tcp', > 'from_port': '53', > 'to_port': '53', > }, > 'http': { > 'name': 'HTTP', > 'ip_protocol': 'tcp', > 'from_port': '80', > 'to_port': '80', > }, > 'pop3': { > 'name': 'POP3', > 'ip_protocol': 'tcp', > 'from_port': '110', > 'to_port': '110', > }, > 'imap': { > 'name': 'IMAP', > 'ip_protocol': 'tcp', > 'from_port': '143', > 'to_port': '143', > }, > 'ldap': { > 'name': 'LDAP', > 'ip_protocol': 'tcp', > 'from_port': '389', > 'to_port': '389', > }, > 'https': { > 'name': 'HTTPS', > 'ip_protocol': 'tcp', > 'from_port': '443', > 'to_port': '443', > }, > 'smtps': { > 'name': 'SMTPS', > 'ip_protocol': 'tcp', > 'from_port': '465', > 'to_port': '465', > }, > 'imaps': { > 'name': 'IMAPS', > 'ip_protocol': 'tcp', > 'from_port': '993', > 'to_port': '993', > }, > 'pop3s': { > 'name': 'POP3S', > 'ip_protocol': 'tcp', > 'from_port': '995', > 'to_port': '995', > }, > 'ms_sql': { > 'name': 'MS SQL', > 'ip_protocol': 'tcp', > 'from_port': '1443', > 'to_port': '1443', > }, > 'mysql': { > 'name': 'MYSQL', > 'ip_protocol': 'tcp', > 'from_port': '3306', > 'to_port': '3306', > }, > 'rdp': { > 'name': 'RDP', > 'ip_protocol': 'tcp', > 'from_port': '3389', > 'to_port': '3389', > }, >} > >LOGIN_URL = '/dashboard/auth/login/' >LOGOUT_URL = '/dashboard/auth/logout/' >LOGIN_REDIRECT_URL = '/dashboard' > ># The Ubuntu package includes pre-compressed JS and compiled CSS to allow ># offline compression by default. To enable online compression, install ># the python-lesscpy package and disable the following option. >COMPRESS_OFFLINE = True > ># For Glance image upload, Horizon uses the file upload support from Django ># so we add this option to change the directory where uploaded files are temporarily ># stored until they are loaded into Glance. >FILE_UPLOAD_TEMP_DIR = '/tmp' >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1155112
: 949266