| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169 |
- #!/usr/bin/env python
- ## -*- coding: utf-8 -*-
- # Licensed to Cloudera, Inc. under one
- # or more contributor license agreements. See the NOTICE file
- # distributed with this work for additional information
- # regarding copyright ownership. Cloudera, Inc. licenses this file
- # to you under the Apache License, Version 2.0 (the
- # "License"); you may not use this file except in compliance
- # with the License. You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- import datetime
- import glob
- import logging
- import os
- import socket
- import stat
- import sys
- from collections import OrderedDict
- from django.db import connection
- from django.utils.translation import ugettext_lazy as _
- from metadata.metadata_sites import get_navigator_audit_log_dir, get_navigator_audit_max_file_size
- from desktop import appmanager
- from desktop.redaction.engine import parse_redaction_policy_from_file
- from desktop.lib.conf import Config, ConfigSection, UnspecifiedConfigSection,\
- coerce_bool, coerce_csv, coerce_json_dict,\
- validate_path, list_of_compiled_res, coerce_str_lowercase, \
- coerce_password_from_script, coerce_string
- from desktop.lib.i18n import force_unicode
- from desktop.lib.paths import get_desktop_root, get_run_root
- if sys.version_info[0] > 2:
- from builtins import str as new_str
- else:
- new_str = unicode
- LOG = logging.getLogger(__name__)
- def is_oozie_enabled():
- """Oozie needs to be available as it is the backend."""
- return len([app for app in appmanager.DESKTOP_MODULES if app.name == 'oozie']) > 0
- def coerce_database(database):
- if database == 'mysql':
- return 'django.db.backends.mysql'
- elif database == 'postgres' or database == 'postgresql_psycopg2':
- return 'django.db.backends.postgresql_psycopg2'
- elif database == 'oracle':
- return 'django.db.backends.oracle'
- elif database in ('sqlite', 'sqlite3'):
- return 'django.db.backends.sqlite3'
- else:
- return str(database)
- def coerce_port(port):
- try:
- port = int(port)
- if port == 0:
- port = ''
- except ValueError:
- port = ''
- return port
- def coerce_file(path):
- if path and not os.path.isfile(path):
- raise Exception('File %s does not exist.' % path)
- return path
- def coerce_timedelta(value):
- return datetime.timedelta(seconds=int(value))
- def get_dn(fqdn=None):
- """This function returns fqdn(if possible)"""
- val = []
- LOG = logging.getLogger(__name__)
- try:
- if fqdn is None:
- fqdn = socket.getfqdn()
- if '.' in fqdn:
- tups = fqdn.split('.')
- if len(tups) > 2:
- val.append(".%s" % ('.'.join(tups[-2:])))
- else:
- LOG.warning("allowed_hosts value to '*'. It is a security risk")
- val.append('*')
- else:
- LOG.warning("allowed_hosts value to '*'. It is a security risk")
- val.append('*')
- except:
- LOG.warning("allowed_hosts value to '*'. It is a security risk")
- val.append('*')
- return val
- def coerce_positive_integer(integer):
- integer = int(integer)
- if integer <= 0:
- raise Exception('integer is not positive')
- return integer
- def is_lb_enabled():
- """Check for Hue Load Balancer is available"""
- return bool(HUE_LOAD_BALANCER.get())
- def coerce_zero_or_positive_integer(integer):
- integer = int(integer)
- if integer < 0:
- raise Exception('integer is negative')
- return integer
- def is_https_enabled():
- """Hue is configured for HTTPS."""
- return bool(SSL_CERTIFICATE.get() and SSL_PRIVATE_KEY.get())
- USE_CHERRYPY_SERVER = Config(
- key="use_cherrypy_server",
- help=_("If set to true, CherryPy will be used. Otherwise, Gunicorn will be used as the webserver."),
- type=coerce_bool,
- default=True)
- GUNICORN_WORKER_CLASS = Config(
- key="gunicorn_work_class",
- help=_("Gunicorn work class: gevent or evenlet, gthread or sync."),
- type=str,
- default="eventlet")
- GUNICORN_NUMBER_OF_WORKERS = Config(
- key="gunicorn_number_of_workers",
- help=_("The number of Gunicorn worker processes. If not specified, it uses: (number of CPU * 2) + 1."),
- type=int,
- default=None)
- HTTP_HOST = Config(
- key="http_host",
- help=_("HTTP host to bind to."),
- type=str,
- default="0.0.0.0")
- HTTP_PORT = Config(
- key="http_port",
- help=_("HTTP port to bind to."),
- type=int,
- default=8888)
- HTTP_ALLOWED_METHODS = Config(
- key="http_allowed_methods",
- help=_("HTTP methods the server will be allowed to service."),
- type=coerce_csv,
- private=True,
- default=['OPTIONS', 'GET', 'HEAD', 'POST', 'PUT', 'DELETE', 'CONNECT'])
- HUE_LOAD_BALANCER = Config(
- key="hue_load_balancer",
- help=_("A comma-separated list of available Hue load balancers."),
- type=coerce_csv,
- default=[]
- )
- X_FRAME_OPTIONS = Config(
- key="http_x_frame_options",
- help=_("X-Frame-Options HTTP header value."),
- type=str,
- default="SAMEORIGIN")
- SSL_CERTIFICATE = Config(
- key="ssl_certificate",
- help=_("Filename of SSL Certificate"),
- type=coerce_file,
- default=None)
- SSL_PRIVATE_KEY = Config(
- key="ssl_private_key",
- help=_("Filename of SSL RSA Private Key"),
- type=coerce_file,
- default=None)
- SSL_CERTIFICATE_CHAIN = Config(
- key="ssl_certificate_chain",
- help=_("Filename of SSL Certificate Chain"),
- type=coerce_file,
- default=None)
- SSL_CIPHER_LIST = Config(
- key="ssl_cipher_list",
- help=_("List of allowed and disallowed ciphers"),
- # From https://wiki.mozilla.org/Security/Server_Side_TLS v3.7 default
- # recommendation, which should be compatible with Firefox 1, Chrome 1, IE 7,
- # Opera 5 and Safari 1.
- default=':'.join([
- 'ECDHE-RSA-AES128-GCM-SHA256',
- 'ECDHE-ECDSA-AES128-GCM-SHA256',
- 'ECDHE-RSA-AES256-GCM-SHA384',
- 'ECDHE-ECDSA-AES256-GCM-SHA384',
- 'DHE-RSA-AES128-GCM-SHA256',
- 'DHE-DSS-AES128-GCM-SHA256',
- 'kEDH+AESGCM',
- 'ECDHE-RSA-AES128-SHA256',
- 'ECDHE-ECDSA-AES128-SHA256',
- 'ECDHE-RSA-AES128-SHA',
- 'ECDHE-ECDSA-AES128-SHA',
- 'ECDHE-RSA-AES256-SHA384',
- 'ECDHE-ECDSA-AES256-SHA384',
- 'ECDHE-RSA-AES256-SHA',
- 'ECDHE-ECDSA-AES256-SHA',
- 'DHE-RSA-AES128-SHA256',
- 'DHE-RSA-AES128-SHA',
- 'DHE-DSS-AES128-SHA256',
- 'DHE-RSA-AES256-SHA256',
- 'DHE-DSS-AES256-SHA',
- 'DHE-RSA-AES256-SHA',
- 'AES128-GCM-SHA256',
- 'AES256-GCM-SHA384',
- 'AES128-SHA256',
- 'AES256-SHA256',
- 'AES128-SHA',
- 'AES256-SHA',
- 'AES',
- 'CAMELLIA',
- 'DES-CBC3-SHA',
- '!aNULL',
- '!eNULL',
- '!EXPORT',
- '!DES',
- '!RC4',
- '!MD5',
- '!PSK',
- '!aECDH',
- '!EDH-DSS-DES-CBC3-SHA',
- '!EDH-RSA-DES-CBC3-SHA',
- '!KRB5-DES-CBC3-SHA',
- ]))
- SSL_PASSWORD = Config(
- key="ssl_password",
- help=_("SSL password of the certificate"),
- default=None)
- SSL_PASSWORD_SCRIPT = Config(
- key="ssl_password_script",
- help=_("Execute this script to produce the SSL password. This will be used when `ssl_password` is not set."),
- type=coerce_password_from_script,
- default=None)
- SSL_CACERTS = Config(
- key="ssl_cacerts",
- help=_('Path to default Certificate Authority certificates.'),
- type=str,
- default='')
- SSL_VALIDATE = Config(
- key="ssl_validate",
- help=_('Choose whether Hue should validate certificates received from the server.'),
- type=coerce_bool,
- default=True)
- SECURE_HSTS_SECONDS = Config(
- key="secure_hsts_seconds",
- help=_('Strict-Transport-Security: max-age=31536000 This is a HTTP response header, Once a supported browser receives this header that browser will prevent any communications from being sent over HTTP to the specified domain and will instead send all communications over HTTPS.'),
- type=int,
- default=31536000)
- SECURE_HSTS_INCLUDE_SUBDOMAINS = Config(
- key="secure_hsts_include_subdomains",
- help=_('Strict-Transport-Security: This is a HTTP response header, Once a supported browser receives this header that browser will prevent any communications from being sent over HTTP to the specified domain and will instead send all communications over HTTPS.'),
- type=coerce_bool,
- default=True)
- SECURE_CONTENT_TYPE_NOSNIFF = Config(
- key="secure_content_type_nosniff",
- help=_('X-Content-Type-Options: nosniff This is a HTTP response header feature that helps prevent attacks based on MIME-type confusion.'),
- type=coerce_bool,
- default=True)
- SECURE_BROWSER_XSS_FILTER = Config(
- key="secure_browser_xss_filter",
- help=_('X-Xss-Protection: \"1; mode=block\" This is a HTTP response header feature to force XSS protection.'),
- type=coerce_bool,
- default=True)
- SECURE_CONTENT_SECURITY_POLICY = Config(
- key="secure_content_security_policy",
- help=_('X-Content-Type-Options: nosniff This is a HTTP response header feature that helps prevent attacks based on MIME-type confusion.'),
- type=str,
- default="script-src 'self' 'unsafe-inline' 'unsafe-eval' *.google-analytics.com *.doubleclick.net data:;"+
- "img-src 'self' *.google-analytics.com *.doubleclick.net http://*.tile.osm.org *.tile.osm.org *.gstatic.com data:;"+
- "style-src 'self' 'unsafe-inline' fonts.googleapis.com;"+
- "connect-src 'self';"+
- "frame-src *;"+
- "child-src 'self' data: *.vimeo.com;"+
- "object-src 'none'")
- SECURE_SSL_REDIRECT = Config(
- key="secure_ssl_redirect",
- help=_('If all non-SSL requests should be permanently redirected to SSL.'),
- type=coerce_bool,
- dynamic_default=is_https_enabled)
- SECURE_SSL_HOST = Config(
- key="secure_redirect_host",
- help=_('If all non-SSL requests should be permanently redirected to this SSL host.'),
- type=str,
- default="0.0.0.0")
- SECURE_REDIRECT_EXEMPT = Config(
- key="secure_redirect_exempt",
- help=_('Comma separated list of strings representing the host/domain names that the Hue server can not serve https.'),
- type=coerce_csv,
- default=[])
- # Deprecated by AUTH_PASSWORD
- LDAP_PASSWORD = Config(
- key="ldap_password",
- help=_("LDAP password of the hue user used for LDAP authentications. For example for LDAP Authentication with HiveServer2/Impala."),
- private=True,
- default=None)
- # Deprecated by AUTH_PASSWORD_SCRIPT
- LDAP_PASSWORD_SCRIPT = Config(
- key="ldap_password_script",
- help=_("Execute this script to produce the LDAP password. This will be used when `ldap_password` is not set."),
- private=True,
- type=coerce_password_from_script,
- default=None)
- # Deprecated by by AUTH_USERNAME
- LDAP_USERNAME = Config(
- key="ldap_username",
- help=_("LDAP username of the hue user used for LDAP authentications. For example for LDAP Authentication with HiveServer2/Impala."),
- private=True,
- default="hue")
- def get_auth_username():
- """Backward compatibility"""
- return LDAP_USERNAME.get()
- AUTH_USERNAME = Config(
- key="auth_username",
- help=_("Auth username of the hue user used for authentications. For example for LDAP Authentication with HiveServer2/Impala."),
- dynamic_default=get_auth_username)
- def get_auth_password():
- """Get from script or backward compatibility"""
- password = os.environ.get('HUE_AUTH_PASSWORD')
- if password is not None:
- return password
- password = AUTH_PASSWORD_SCRIPT.get()
- if password:
- return password
- password = os.environ.get('HUE_LDAP_PASSWORD')
- if password is not None:
- return password
- password = LDAP_PASSWORD.get() # 2 levels for backward compatibility
- if password:
- return password
- return LDAP_PASSWORD_SCRIPT.get()
- AUTH_PASSWORD = Config(
- key="auth_password",
- help=_("LDAP/PAM/.. password of the hue user used for authentications. Inactive if empty. For example for LDAP Authentication with HiveServer2/Impala."),
- private=True,
- dynamic_default=get_auth_password)
- AUTH_PASSWORD_SCRIPT = Config(
- key="auth_password_script",
- help=_("Execute this script to produce the auth password. This will be used when `auth_password` is not set."),
- private=True,
- type=coerce_password_from_script,
- default=None)
- ENABLE_SERVER = Config(
- key="enable_server",
- help=_("If set to false, runcpserver will not actually start the web server. Used if Apache is being used as a WSGI container."),
- type=coerce_bool,
- default=True)
- CHERRYPY_SERVER_THREADS = Config(
- key="cherrypy_server_threads",
- help=_("Number of threads used by the CherryPy web server."),
- type=int,
- default=50)
- SECRET_KEY = Config(
- key="secret_key",
- help=_("Used in hashing algorithms for sessions."),
- default="")
- SECRET_KEY_SCRIPT = Config(
- key="secret_key_script",
- help=_("Execute this script to produce the Django secret key. This will be used when `secret_key` is not set."),
- type=coerce_password_from_script,
- private=True,
- default="")
- USER_ACCESS_HISTORY_SIZE = Config(
- key="user_access_history_size",
- help=_("Number of user access to remember per view per user."),
- type=int,
- default=10)
- COLLECT_USAGE = Config(
- key="collect_usage",
- help=_("Help improve Hue with anonymous usage analytics."
- "Use Google Analytics to see how many times an application or specific section of an application is used, nothing more."),
- type=coerce_bool,
- default=True)
- REST_RESPONSE_SIZE = Config(
- key="rest_response_size",
- help=_("Number of characters the rest api reponse calls to dump to the logs when debug is enabled. Enter -1 for entire response."),
- type=int,
- default=2000)
- LEAFLET_TILE_LAYER = Config(
- key="leaflet_tile_layer",
- help=_("Tile layer server URL for the Leaflet map charts. Read more on http://leafletjs.com/reference.html#tilelayer. Make sure you add the tile domain to the img-src section of the 'secure_content_security_policy' configuration parameter as well."),
- type=str,
- default="http://{s}.tile.osm.org/{z}/{x}/{y}.png")
- LEAFLET_TILE_LAYER_ATTRIBUTION = Config(
- key="leaflet_tile_layer_attribution",
- help=_("The copyright message for the specified Leaflet maps Tile Layer"),
- default='© <a href="http://osm.org/copyright">OpenStreetMap</a> contributors')
- LEAFLET_MAP_OPTIONS = Config(
- key="leaflet_map_options",
- help=_("All the map options, accordingly to http://leafletjs.com/reference-0.7.7.html#map-options. To change CRS, just use the name, ie. 'EPSG4326'"),
- type=coerce_json_dict,
- default="{}")
- LEAFLET_TILE_LAYER_OPTIONS = Config(
- key="leaflet_tile_layer_options",
- help=_("All the tile layer options, accordingly to http://leafletjs.com/reference-0.7.7.html#tilelayer"),
- type=coerce_json_dict,
- default="{}")
- POLL_ENABLED = Config(
- key="poll_enabled",
- help=_("Use poll(2) in Hue thrift pool."),
- type=coerce_bool,
- private=True,
- default=True)
- MIDDLEWARE = Config(
- key="middleware",
- help=_("Comma-separated list of Django middleware classes to use. " +
- "See https://docs.djangoproject.com/en/1.4/ref/middleware/ for " +
- "more details on middlewares in Django."),
- type=coerce_csv,
- default=[])
- REDIRECT_WHITELIST = Config(
- key="redirect_whitelist",
- help=_("Comma-separated list of regular expressions, which match the redirect URL."
- "For example, to restrict to your local domain and FQDN, the following value can be used:"
- " ^\/.*$,^http:\/\/www.mydomain.com\/.*$"),
- type=list_of_compiled_res(skip_empty=True),
- default='^(\/[a-zA-Z0-9]+.*|\/)$')
- USE_X_FORWARDED_HOST = Config(
- key="use_x_forwarded_host",
- help=_("Enable X-Forwarded-Host header if the load balancer requires it."),
- type=coerce_bool,
- dynamic_default=is_lb_enabled)
- SECURE_PROXY_SSL_HEADER = Config(
- key="secure_proxy_ssl_header",
- help=_("Support for HTTPS termination at the load-balancer level with SECURE_PROXY_SSL_HEADER."),
- type=coerce_bool,
- default=False)
- APP_BLACKLIST = Config(
- key='app_blacklist',
- default='',
- type=coerce_csv,
- help=_('Comma separated list of apps to not load at server startup.')
- )
- CLUSTER_ID = Config(
- key="cluster_id",
- help=_("Id of the cluster where Hue is located."),
- private=False,
- default='default')
- DEMO_ENABLED = Config( # Internal and Temporary
- key="demo_enabled",
- help=_("To set to true in combination when using Hue demo backend."),
- type=coerce_bool,
- private=True,
- default=False)
- LOG_REDACTION_FILE = Config(
- key="log_redaction_file",
- help=_("Use this file to parse and redact log message."),
- type=parse_redaction_policy_from_file,
- default=None)
- ALLOWED_HOSTS = Config(
- key='allowed_hosts',
- # dynamic_default=get_dn, # Currently off as pretty disruptive
- default=['*'],
- type=coerce_csv,
- help=_('Comma separated list of strings representing the host/domain names that the Hue server can serve.')
- )
- REST_CONN_TIMEOUT = Config(
- key='rest_conn_timeout',
- default=120,
- type=int,
- help=_('Timeout in seconds for REST calls.'))
- VCS = UnspecifiedConfigSection(
- "vcs",
- help="One entry for each Version Control",
- each=ConfigSection(
- help="""Configuration options for source version control used to list and
- save files from the editor. Example: Git, SVN""",
- members=dict(
- REMOTE_URL = Config(
- key="remote_url",
- help=_("Base URL to Interface Remote Server"),
- default='https://github.com/cloudera/hue/tree/master',
- type=coerce_string,
- ),
- API_URL = Config(
- key="api_url",
- help=_("Base URL to Interface API"),
- default='https://api.github.com',
- type=coerce_string,
- ),
- CLIENT_ID = Config(
- key="client_id",
- help=_("The Client ID of the Interface application."),
- type=coerce_string,
- default=""
- ),
- CLIENT_SECRET = Config(
- key="client_secret",
- help=_("The Client Secret of the Interface application."),
- type=coerce_string,
- default=""
- )
- )
- )
- )
- def default_secure_cookie():
- """Enable secure cookies if HTTPS is enabled."""
- return is_https_enabled()
- def default_ssl_cacerts():
- """Path to default Certificate Authority certificates"""
- return SSL_CACERTS.get()
- def default_ssl_validate():
- """Choose whether Hue should validate certificates received from the server."""
- return SSL_VALIDATE.get()
- #
- # Email (SMTP) settings
- #
- _default_from_email = None
- def default_from_email():
- """Email for hue@<host-fqdn>"""
- global _default_from_email
- if _default_from_email is None:
- try:
- fqdn = socket.getfqdn()
- except IOError:
- fqdn = 'localhost'
- _default_from_email = "hue@" + fqdn
- return _default_from_email
- def default_database_options():
- """Database type dependent options"""
- if DATABASE.ENGINE.get().endswith('oracle'):
- return {'threaded': True}
- elif DATABASE.ENGINE.get().endswith('sqlite3'):
- return {'timeout': 30}
- else:
- return {}
- def get_deprecated_login_lock_out_by_combination_browser_user_agent():
- """Return value of deprecated LOGIN_LOCK_OUT_BY_COMBINATION_BROWSER_USER_AGENT_AND_IP config"""
- return AUTH.LOGIN_LOCK_OUT_BY_COMBINATION_BROWSER_USER_AGENT_AND_IP.get()
- SMTP = ConfigSection(
- key='smtp',
- help=_('Configuration options for connecting to an external SMTP server.'),
- members=dict(
- HOST = Config(
- key="host",
- help=_("The SMTP server for email notification delivery."),
- type=str,
- default="localhost"
- ),
- PORT = Config(
- key="port",
- help=_("The SMTP server port."),
- type=int,
- default=25
- ),
- USER = Config(
- key="user",
- help=_("The username for the SMTP host."),
- type=str,
- default=""
- ),
- PASSWORD = Config(
- key="password",
- help=_("The password for the SMTP user."),
- type=str,
- private=True,
- default="",
- ),
- PASSWORD_SCRIPT = Config(
- key="password_script",
- help=_("Execute this script to produce the SMTP user password. This will be used when the SMTP `password` is not set."),
- type=coerce_password_from_script,
- private=True,
- default="",
- ),
- USE_TLS = Config(
- key="tls",
- help=_("Whether to use a TLS (secure) connection when talking to the SMTP server."),
- type=coerce_bool,
- default=False
- ),
- DEFAULT_FROM= Config(
- key="default_from_email",
- help=_("Default email address to use for various automated notifications from Hue."),
- type=str,
- dynamic_default=default_from_email
- ),
- )
- )
- METRICS = ConfigSection(
- key='metrics',
- help=_("""Configuration options for metrics"""),
- members=dict(
- ENABLE_WEB_METRICS=Config(
- key='enable_web_metrics',
- help=_('Enable metrics URL "desktop/metrics"'),
- default=True,
- type=coerce_bool),
- LOCATION=Config(
- key='location',
- help=_('If specified, Hue will write metrics to this file'),
- type=str),
- COLLECTION_INTERVAL=Config(
- key='collection_interval',
- help=_('Time in milliseconds on how frequently to collect metrics'),
- type=coerce_positive_integer,
- default=30000),
- )
- )
- ANALYTICS = ConfigSection(
- key='analytics',
- help=_("""Configuration options for analytics user usage for admins"""),
- members=dict(
- IS_ENABLED=Config(
- key='is_enabled',
- help=_('Enable analytics page'),
- default=False,
- type=coerce_bool),
- )
- )
- DATABASE = ConfigSection(
- key='database',
- help=_("""Configuration options for specifying the Desktop Database.
- For more info, see http://docs.djangoproject.com/en/1.4/ref/settings/#database-engine"""),
- members=dict(
- ENGINE=Config(
- key='engine',
- help=_('Database engine, such as postgresql_psycopg2, mysql, or sqlite3.'),
- type=coerce_database,
- default='django.db.backends.sqlite3',
- ),
- NAME=Config(
- key='name',
- help=_('Database name, or path to DB if using sqlite3.'),
- type=str,
- default=get_desktop_root('desktop.db'),
- ),
- USER=Config(
- key='user',
- help=_('Database username.'),
- type=str,
- default='',
- ),
- SCHEMA=Config(
- key='schema',
- help=_('Database schema, to be used only when public schema is revoked in postgres.'),
- type=str,
- default='public',
- ),
- PASSWORD=Config(
- key='password',
- help=_('Database password.'),
- private=True,
- type=str,
- default="",
- ),
- PASSWORD_SCRIPT=Config(
- key='password_script',
- help=_('Execute this script to produce the database password. This will be used when `password` is not set.'),
- private=True,
- type=coerce_password_from_script,
- default="",
- ),
- HOST=Config(
- key='host',
- help=_('Database host.'),
- type=str,
- default='',
- ),
- PORT=Config(
- key='port',
- help=_('Database port.'),
- type=coerce_port,
- default='',
- ),
- OPTIONS=Config(
- key='options',
- help=_('Database options to send to the server when connecting.'),
- type=coerce_json_dict,
- dynamic_default=default_database_options
- ),
- CONN_MAX_AGE=Config(
- key='conn_max_age',
- help=_('The CONN_MAX_AGE parameter controls db connections persistency in seconds.'),
- type=coerce_zero_or_positive_integer,
- default=0,
- )
- )
- )
- SESSION = ConfigSection(
- key='session',
- help=_("""Configuration options for specifying the Desktop session.
- For more info, see https://docs.djangoproject.com/en/1.4/topics/http/sessions/"""),
- members=dict(
- COOKIE_NAME=Config(
- key='cookie_name',
- help=_("The name of the cookie to use for sessions."
- "This can have any value that is not used by the other cookie names in your application."),
- type=str,
- default="sessionid",
- ),
- TTL=Config(
- key='ttl',
- help=_("The cookie containing the users' session ID will expire after this amount of time in seconds."),
- type=int,
- default=60*60*24*14,
- ),
- SECURE=Config(
- key='secure',
- help=_("The cookie containing the users' session ID will be secure. This should only be enabled with HTTPS."),
- type=coerce_bool,
- dynamic_default=default_secure_cookie,
- ),
- HTTP_ONLY=Config(
- key='http_only',
- help=_("The cookie containing the users' session ID will use the HTTP only flag."),
- type=coerce_bool,
- default=True,
- ),
- EXPIRE_AT_BROWSER_CLOSE=Config(
- key='expire_at_browser_close',
- help=_("Use session-length cookies. Logs out the user when she closes the browser window."),
- type=coerce_bool,
- default=False
- ),
- CONCURRENT_USER_SESSION_LIMIT = Config(
- key="concurrent_user_session_limit",
- help=_("If set, limits the number of concurrent user sessions. 1 represents 1 session per user. Default: 0 (unlimited sessions per user)"),
- type=int,
- default=0,
- ),
- TRUSTED_ORIGINS = Config(
- key="trusted_origins",
- help=_("A list of hosts which are trusted origins for unsafe requests. See django's CSRF_TRUSTED_ORIGINS for more information"),
- type=coerce_csv,
- default='.cloudera.com',
- )
- )
- )
- KNOX = ConfigSection(
- key="knox",
- help=_("""Configuration options for specifying Hue's KNOX integration for secured Hadoop clusters."""),
- members=dict(
- KNOX_PRINCIPAL=Config(
- key='knox_principal',
- help=_("Comma separated list of Kerberos principal name for Hue. Typically 'knox/hostname.foo.com'."),
- type=coerce_csv,
- default="knox/%s" % socket.getfqdn()),
- KNOX_PROXYHOSTS = Config(
- key='knox_proxyhosts',
- default="%s" % socket.getfqdn(),
- type=coerce_csv,
- help=_('Comma separated list of strings representing the host names that the Hue server can trust as knox hosts.')
- ),
- KNOX_PORTS = Config(
- key='knox_ports',
- default=['80', '8443'],
- type=coerce_csv,
- help=_('Comma separated list of strings representing the ports that the Hue server can trust as knox port.')
- ),
- )
- )
- KERBEROS = ConfigSection(
- key="kerberos",
- help=_("""Configuration options for specifying Hue's Kerberos integration for
- secured Hadoop clusters."""),
- members=dict(
- HUE_KEYTAB=Config(
- key='hue_keytab',
- help=_("Path to a Kerberos keytab file containing Hue's service credentials."),
- type=str,
- default=None),
- HUE_PRINCIPAL=Config(
- key='hue_principal',
- help=_("Kerberos principal name for Hue. Typically 'hue/hostname.foo.com'."),
- type=str,
- default="hue/%s" % socket.getfqdn()),
- KEYTAB_REINIT_FREQUENCY=Config(
- key='reinit_frequency',
- help=_("Frequency in seconds with which Hue will renew its keytab."),
- type=int,
- default=60*60), #1h
- CCACHE_PATH=Config(
- key='ccache_path',
- help=_("Path to keep Kerberos credentials cached."),
- private=True,
- type=str,
- default="/var/run/hue/hue_krb5_ccache",
- ),
- KINIT_PATH=Config(
- key='kinit_path',
- help=_("Path to Kerberos 'kinit' command."),
- type=str,
- default="kinit", # use PATH!
- ),
- MUTUAL_AUTHENTICATION=Config(
- key='mutual_authentication',
- help=_('Mutual authentication from the server, attaches HTTP GSSAPI/Kerberos Authentication to the given Request object'),
- type=str,
- default="OPTIONAL",
- ),
- )
- )
- SASL_MAX_BUFFER = Config(
- key="sasl_max_buffer",
- help=_("This property specifies the maximum size of the receive buffer in bytes in thrift sasl communication."),
- default=2*1024*1024, # 2 MB
- type=int
- )
- ENABLE_SMART_THRIFT_POOL = Config(
- key="enable_smart_thrift_pool",
- help=_("Hue will try to get the actual host of the Service, even if it resides behind a load balancer. "
- "This will enable an automatic configuration of the service without requiring custom configuration of the service load balancer. "
- "This is available for the Impala service only currently. It is highly recommended to only point to a series of coordinator-only nodes only."),
- type=coerce_bool,
- default=False
- )
- # See python's documentation for time.tzset for valid values.
- TIME_ZONE = Config(
- key="time_zone",
- help=_("Time zone name."),
- type=str,
- default=os.environ.get("TZ", "America/Los_Angeles")
- )
- DEFAULT_SITE_ENCODING = Config(
- key='default_site_encoding',
- help=_('Default system-wide unicode encoding.'),
- type=str,
- default='utf-8'
- )
- SERVER_USER = Config(
- key="server_user",
- help=_("Username to run servers as."),
- type=str,
- default="hue")
- SERVER_GROUP = Config(
- key="server_group",
- help=_("Group to run servers as."),
- type=str,
- default="hue")
- DEFAULT_USER = Config(
- key="default_user",
- help=_("This should be the user running hue webserver"),
- type=str,
- default="hue")
- DEFAULT_HDFS_SUPERUSER = Config(
- key="default_hdfs_superuser",
- help=_("This should be the hdfs super user"),
- type=str,
- default="hdfs")
- CUSTOM = ConfigSection(
- key="custom",
- help=_("Customizations to the UI."),
- members=dict(
- BANNER_TOP_HTML=Config("banner_top_html",
- default="",
- help=_("Top banner HTML code. This code will be placed in the navigation bar "
- "so that it will reside at the top of the page in a fixed position. " +
- "One common value is `<img src=\"http://www.example.com/example.gif\" />`")),
- LOGIN_SPLASH_HTML=Config("login_splash_html",
- default="",
- help=_("The login splash HTML code. This code will be placed in the login page, "
- "useful for security warning messages.")),
- CACHEABLE_TTL=Config("cacheable_ttl",
- default=10 * 24 * 60 * 60 * 1000,
- type=int,
- help=_("The cache TTL in milliseconds for the assist/autocomplete/etc calls. Set to 0 it disables the cache.")),
- LOGO_SVG=Config("logo_svg",
- default="",
- help=_("SVG code to replace the default Hue logo in the top bar and sign in screen")),
- ))
- AUTH = ConfigSection(
- key="auth",
- help=_("Configuration options for user authentication into the web application."),
- members=dict(
- BACKEND=Config("backend",
- default=["desktop.auth.backend.AllowFirstUserDjangoBackend"],
- type=coerce_csv,
- help=_("Authentication backend. Common settings are "
- "django.contrib.auth.backends.ModelBackend (fully Django backend), " +
- "desktop.auth.backend.AllowAllBackend (allows everyone), " +
- "desktop.auth.backend.AllowFirstUserDjangoBackend (relies on Django and user manager, after the first login). " +
- "Multiple Authentication backends are supported by specifying a comma-separated list in order of priority.")),
- USER_AUGMENTOR=Config("user_augmentor",
- default="desktop.auth.backend.DefaultUserAugmentor",
- help=_("Class which defines extra accessor methods for User objects.")),
- PAM_SERVICE=Config("pam_service",
- default="login",
- help=_("The service to use when querying PAM. "
- "The service usually corresponds to a single filename in /etc/pam.d")),
- REMOTE_USER_HEADER=Config("remote_user_header",
- default="HTTP_REMOTE_USER",
- help=_("When using the desktop.auth.backend.RemoteUserDjangoBackend, this sets "
- "the normalized name of the header that contains the remote user. "
- "The HTTP header in the request is converted to a key by converting "
- "all characters to uppercase, replacing any hyphens with underscores "
- "and adding an HTTP_ prefix to the name. So, for example, if the header "
- "is called Remote-User that would be configured as HTTP_REMOTE_USER")),
- IGNORE_USERNAME_CASE = Config("ignore_username_case",
- help=_("Ignore the case of usernames when searching for existing users in Hue."),
- type=coerce_bool,
- default=True),
- FORCE_USERNAME_LOWERCASE = Config("force_username_lowercase",
- help=_("Force usernames to lowercase when creating new users."),
- type=coerce_bool,
- default=True),
- FORCE_USERNAME_UPPERCASE = Config("force_username_uppercase",
- help=_("Force usernames to uppercase when creating new users."),
- type=coerce_bool,
- default=False),
- EXPIRES_AFTER = Config("expires_after",
- help=_("Users will expire after they have not logged in for 'n' amount of seconds."
- "A negative number means that users will never expire."),
- type=int,
- default=-1),
- EXPIRE_SUPERUSERS = Config("expire_superusers",
- help=_("Apply 'expires_after' to superusers."),
- type=coerce_bool,
- default=True),
- IDLE_SESSION_TIMEOUT = Config("idle_session_timeout",
- help=_("Users will automatically be logged out after 'n' seconds of inactivity."
- "A negative number means that idle sessions will not be timed out."),
- type=int,
- default=-1),
- CHANGE_DEFAULT_PASSWORD = Config(
- key="change_default_password",
- help=_("When set to true this will allow you to specify a password for "
- "the user when you create the user and then force them to change "
- "their password upon first login. The default is false."),
- type=coerce_bool,
- default=False,
- ),
- LOGIN_FAILURE_LIMIT = Config(
- key="login_failure_limit",
- help=_("Number of login attempts allowed before a record is created for failed logins"),
- type=int,
- default=3,
- ),
- LOGIN_LOCK_OUT_AT_FAILURE = Config(
- key="login_lock_out_at_failure",
- help=_("After number of allowed login attempts are exceeded, do we lock out this IP and optionally user agent?"),
- type=coerce_bool,
- default=False,
- ),
- LOGIN_COOLOFF_TIME = Config(
- key="login_cooloff_time",
- help=_("If set, defines period of inactivity in hours after which failed logins will be forgotten."
- "A value of 0 or None will disable this check. Default: None."),
- type=coerce_timedelta,
- default=None,
- ),
- # Deprecated by LOGIN_LOCK_OUT_USE_USER_AGENT
- LOGIN_LOCK_OUT_BY_COMBINATION_BROWSER_USER_AGENT_AND_IP=Config(
- key="login_lock_out_by_combination_browser_user_agent_and_ip",
- help=_("If True, lock out based on IP and browser user agent"),
- type=coerce_bool,
- default=False,
- ),
- LOGIN_LOCK_OUT_USE_USER_AGENT = Config(
- key="login_lock_out_use_user_agent",
- help=_("If True, lock out based on an IP address AND a user agent."
- "This means requests from different user agents but from the same IP are treated differently."),
- type=coerce_bool,
- dynamic_default=get_deprecated_login_lock_out_by_combination_browser_user_agent
- ),
- LOGIN_LOCK_OUT_BY_COMBINATION_USER_AND_IP = Config(
- key="login_lock_out_by_combination_user_and_ip",
- help=_("If True, lock out based on IP and user"),
- type=coerce_bool,
- default=False,
- ),
- BEHIND_REVERSE_PROXY = Config(
- key="behind_reverse_proxy",
- help=_("If True, it will look for the IP address from the header defined at reverse_proxy_header."),
- type=coerce_bool,
- dynamic_default=is_lb_enabled,
- ),
- REVERSE_PROXY_HEADER = Config(
- key="reverse_proxy_header",
- help=_("If behind_reverse_proxy is True, it will look for the IP address from this header. Default: HTTP_X_FORWARDED_FOR"),
- type=str,
- default="HTTP_X_FORWARDED_FOR",
- )
- ))
- LDAP = ConfigSection(
- key="ldap",
- help=_("Configuration options for LDAP connectivity."),
- members=dict(
- CREATE_USERS_ON_LOGIN = Config("create_users_on_login",
- help=_("Create users when they login with their LDAP credentials."),
- type=coerce_bool,
- default=True),
- SYNC_GROUPS_ON_LOGIN = Config("sync_groups_on_login",
- help=_("Synchronize a users groups when they login."),
- type=coerce_bool,
- default=True),
- IGNORE_USERNAME_CASE = Config("ignore_username_case",
- help=_("Ignore the case of usernames when searching for existing users in Hue."),
- type=coerce_bool,
- default=True),
- FORCE_USERNAME_LOWERCASE = Config("force_username_lowercase",
- help=_("Force usernames to lowercase when creating new users from LDAP."),
- type=coerce_bool,
- default=True),
- FORCE_USERNAME_UPPERCASE = Config("force_username_uppercase",
- help=_("Force usernames to uppercase when creating new users from LDAP."),
- type=coerce_bool,
- default=False),
- SUBGROUPS = Config("subgroups",
- help=_("Choose which kind of subgrouping to use: nested or suboordinate (deprecated)."),
- type=coerce_str_lowercase,
- default="suboordinate"),
- NESTED_MEMBERS_SEARCH_DEPTH = Config("nested_members_search_depth",
- help=_("Define the number of levels to search for nested members."),
- type=int,
- default=10),
- FOLLOW_REFERRALS = Config("follow_referrals",
- help=_("Whether or not to follow referrals."),
- type=coerce_bool,
- default=False),
- LOGIN_GROUPS = Config("login_groups",
- help=_("A comma-separated list of Ldap groups with users that can login"),
- type=coerce_csv,
- default=[]),
- DEBUG = Config("debug",
- type=coerce_bool,
- default=False,
- help=_("Set to a value to enable python-ldap debugging.")),
- DEBUG_LEVEL = Config("debug_level",
- default=255,
- type=int,
- help=_("Sets the debug level within the underlying LDAP C lib.")),
- TRACE_LEVEL = Config("trace_level",
- default=0,
- type=int,
- help=_("Possible values for trace_level are 0 for no logging, 1 for only logging the method calls with arguments,"
- "2 for logging the method calls with arguments and the complete results and 9 for also logging the traceback of method calls.")),
- LDAP_SERVERS = UnspecifiedConfigSection(
- key="ldap_servers",
- help=_("LDAP server record."),
- each=ConfigSection(
- members=dict(
- BASE_DN=Config("base_dn",
- default=None,
- help=_("The base LDAP distinguished name to use for LDAP search.")),
- NT_DOMAIN=Config("nt_domain",
- default=None,
- help=_("The NT domain used for LDAP authentication.")),
- LDAP_URL=Config("ldap_url",
- default=None,
- help=_("The LDAP URL to connect to.")),
- USE_START_TLS=Config("use_start_tls",
- default=True,
- type=coerce_bool,
- help=_("Use StartTLS when communicating with LDAP server.")),
- LDAP_CERT=Config("ldap_cert",
- default=None,
- help=_("A PEM-format file containing certificates for the CA's that Hue will trust for authentication over TLS. The certificate for the CA that signed the LDAP server certificate must be included among these certificates. See more here http://www.openldap.org/doc/admin24/tls.html.")),
- LDAP_USERNAME_PATTERN=Config("ldap_username_pattern",
- default=None,
- help=_("A pattern to use for constructing LDAP usernames.")),
- BIND_DN=Config("bind_dn",
- default=None,
- help=_("The distinguished name to bind as, when importing from LDAP.")),
- BIND_PASSWORD=Config("bind_password",
- default=None,
- private=True,
- help=_("The password for the bind user.")),
- BIND_PASSWORD_SCRIPT=Config("bind_password_script",
- default=None,
- private=True,
- type=coerce_password_from_script,
- help=_("Execute this script to produce the LDAP bind user password. This will be used when `bind_password` is not set.")),
- SEARCH_BIND_AUTHENTICATION=Config("search_bind_authentication",
- default=True,
- type=coerce_bool,
- help=_("Use search bind authentication.")),
- FOLLOW_REFERRALS = Config("follow_referrals",
- help=_("Whether or not to follow referrals."),
- type=coerce_bool,
- default=False),
- TEST_LDAP_USER=Config("test_ldap_user",
- default=None,
- help=_("The test user name to use for LDAP search.")),
- TEST_LDAP_GROUP=Config("test_ldap_group",
- default=None,
- help=_("The test group name to use for LDAP search.")),
- DEBUG = Config("debug",
- type=coerce_bool,
- default=False,
- help=_("Set to a value to enable python-ldap debugging.")),
- DEBUG_LEVEL = Config("debug_level",
- default=255,
- type=int,
- help=_("Sets the debug level within the underlying LDAP C lib.")),
- TRACE_LEVEL = Config("trace_level",
- default=0,
- type=int,
- help=_("Possible values for trace_level are 0 for no logging, 1 for only logging the method calls with arguments,"
- "2 for logging the method calls with arguments and the complete results and 9 for also logging the traceback of method calls.")),
- USERS = ConfigSection(
- key="users",
- help=_("Configuration for LDAP user schema and search."),
- members=dict(
- USER_FILTER=Config("user_filter",
- default="objectclass=*",
- help=_("A base filter for use when searching for users.")),
- USER_NAME_ATTR=Config("user_name_attr",
- default="sAMAccountName",
- help=_("The username attribute in the LDAP schema. "
- "Typically, this is 'sAMAccountName' for AD and 'uid' "
- "for other LDAP systems.")),
- )
- ),
- GROUPS = ConfigSection(
- key="groups",
- help=_("Configuration for LDAP group schema and search."),
- members=dict(
- GROUP_FILTER=Config("group_filter",
- default="objectclass=*",
- help=_("A base filter for use when searching for groups.")),
- GROUP_NAME_ATTR=Config("group_name_attr",
- default="cn",
- help=_("The group name attribute in the LDAP schema. "
- "Typically, this is 'cn'.")),
- GROUP_MEMBER_ATTR=Config("group_member_attr",
- default="member",
- help=_("The LDAP attribute which specifies the "
- "members of a group.")),
- ))))),
- # Every thing below here is deprecated and should be removed in an upcoming major release.
- BASE_DN=Config("base_dn",
- default=None,
- help=_("The base LDAP distinguished name to use for LDAP search.")),
- NT_DOMAIN=Config("nt_domain",
- default=None,
- help=_("The NT domain used for LDAP authentication.")),
- LDAP_URL=Config("ldap_url",
- default=None,
- help=_("The LDAP URL to connect to.")),
- USE_START_TLS=Config("use_start_tls",
- default=True,
- type=coerce_bool,
- help=_("Use StartTLS when communicating with LDAP server.")),
- LDAP_CERT=Config("ldap_cert",
- default=None,
- help=_("A PEM-format file containing certificates for the CA's that Hue will trust for authentication over TLS. The certificate for the CA that signed the LDAP server certificate must be included among these certificates. See more here http://www.openldap.org/doc/admin24/tls.html.")),
- LDAP_USERNAME_PATTERN=Config("ldap_username_pattern",
- default=None,
- help=_("A pattern to use for constructing LDAP usernames.")),
- BIND_DN=Config("bind_dn",
- default=None,
- help=_("The distinguished name to bind as, when importing from LDAP.")),
- BIND_PASSWORD=Config("bind_password",
- default=None,
- private=True,
- help=_("The password for the bind user.")),
- BIND_PASSWORD_SCRIPT=Config("bind_password_script",
- default=None,
- private=True,
- type=coerce_password_from_script,
- help=_("Execute this script to produce the LDAP bind user password. This will be used when `bind_password` is not set.")),
- SEARCH_BIND_AUTHENTICATION=Config("search_bind_authentication",
- default=True,
- type=coerce_bool,
- help=_("Use search bind authentication.")),
- TEST_LDAP_USER=Config("test_ldap_user",
- default=None,
- help=_("The test user name to use for LDAP search.")),
- TEST_LDAP_GROUP=Config("test_ldap_group",
- default=None,
- help=_("The test group name to use for LDAP search.")),
- USERS = ConfigSection(
- key="users",
- help=_("Configuration for LDAP user schema and search."),
- members=dict(
- USER_FILTER=Config("user_filter",
- default="objectclass=*",
- help=_("A base filter for use when searching for users.")),
- USER_NAME_ATTR=Config("user_name_attr",
- default="sAMAccountName",
- help=_("The username attribute in the LDAP schema. "
- "Typically, this is 'sAMAccountName' for AD and 'uid' "
- "for other LDAP systems.")),
- )),
- GROUPS = ConfigSection(
- key="groups",
- help=_("Configuration for LDAP group schema and search."),
- members=dict(
- GROUP_FILTER=Config("group_filter",
- default="objectclass=*",
- help=_("A base filter for use when searching for groups.")),
- GROUP_NAME_ATTR=Config("group_name_attr",
- default="cn",
- help=_("The group name attribute in the LDAP schema. "
- "Typically, this is 'cn'.")),
- GROUP_MEMBER_ATTR=Config("group_member_attr",
- default="member",
- help=_("The LDAP attribute which specifies the "
- "members of a group.")),
- ))))
- OAUTH = ConfigSection(
- key='oauth',
- help=_('Configuration options for Oauth 1.0 authentication'),
- members=dict(
- CONSUMER_KEY = Config(
- key="consumer_key",
- help=_("The Consumer key of the application."),
- type=str,
- default="XXXXXXXXXXXXXXXXXXXXX"
- ),
- CONSUMER_SECRET = Config(
- key="consumer_secret",
- help=_("The Consumer secret of the application."),
- type=str,
- default="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
- ),
- REQUEST_TOKEN_URL = Config(
- key="request_token_url",
- help=_("The Request token URL."),
- type=str,
- default="https://api.twitter.com/oauth/request_token"
- ),
- ACCESS_TOKEN_URL = Config(
- key="access_token_url",
- help=_("The Access token URL."),
- type=str,
- default="https://api.twitter.com/oauth/access_token"
- ),
- AUTHENTICATE_URL = Config(
- key="authenticate_url",
- help=_("The Authorize URL."),
- type=str,
- default="https://api.twitter.com/oauth/authorize"
- ),
- )
- )
- OIDC = ConfigSection(
- key='oidc',
- help=_('Configuration options for OpenID Connect authentication'),
- members=dict(
- OIDC_RP_CLIENT_ID = Config(
- key="oidc_rp_client_id",
- help=_("The client ID as relay party set in OpenID provider."),
- type=str,
- default="XXXXXXXXXXXXXXXXXXXXX"
- ),
- OIDC_RP_CLIENT_SECRET = Config(
- key="oidc_rp_client_secret",
- help=_("The client secret as relay party set in OpenID provider."),
- type=str,
- default="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
- ),
- OIDC_OP_AUTHORIZATION_ENDPOINT = Config(
- key="oidc_op_authorization_endpoint",
- help=_("The OpenID provider authoriation endpoint."),
- type=str,
- default="https://keycloak.example.com/auth/realms/Cloudera/protocol/openid-connect/auth"
- ),
- OIDC_OP_TOKEN_ENDPOINT = Config(
- key="oidc_op_token_endpoint",
- help=_("The OpenID provider token endpoint."),
- type=str,
- default="https://keycloak.example.com/auth/realms/cloudera/protocol/openid-connect/token"
- ),
- AUTHENTICATE_URL = Config(
- key="authenticate_url",
- help=_("The Authorize URL."),
- type=str,
- default="https://api.twitter.com/oauth/authorize"
- ),
- OIDC_OP_USER_ENDPOINT=Config(
- key="oidc_op_user_endpoint",
- help=_("The OpenID provider user info endpoint."),
- type=str,
- default="https://keycloak.example.com/auth/realms/cloudera/protocol/openid-connect/userinfo"
- ),
- OIDC_RP_IDP_SIGN_KEY=Config(
- key="oidc_rp_idp_sign_key",
- help=_("The OpenID provider signing key in PEM or DER format."),
- type=str,
- default=None
- ),
- OIDC_OP_JWKS_ENDPOINT=Config(
- key="oidc_op_jwks_endpoint",
- help=_("The OpenID provider authoriation endpoint."),
- type=str,
- default="https://keycloak.example.com/auth/realms/Cloudera/protocol/openid-connect/certs"
- ),
- OIDC_VERIFY_SSL=Config(
- key="oidc_verify_ssl",
- help=_("Whether Hue as OpenID Connect client verify SSL cert."),
- type=coerce_bool,
- default=False
- ),
- LOGIN_REDIRECT_URL=Config(
- key="login_redirect_url",
- help=_("As relay party Hue URL path to redirect to after login."),
- type=str,
- default="https://localhost:8888/oidc/callback/"
- ),
- LOGOUT_REDIRECT_URL=Config(
- key="logout_redirect_url",
- help=_("The OpenID provider URL path to redirect to after logout."),
- type=str,
- default="https://keycloak.example.com/auth/realms/cloudera/protocol/openid-connect/logout"
- ),
- LOGIN_REDIRECT_URL_FAILURE=Config(
- key="login_redirect_url_failure",
- help=_("As relay party Hue URL path to redirect to after login."),
- type=str,
- default="https://localhost:8888/hue/oidc_failed/"
- ),
- CREATE_USERS_ON_LOGIN=Config(
- key="create_users_on_login",
- help=_("Create a new user from OpenID Connect on login if it doesn't exist."),
- type=coerce_bool,
- default=True
- ),
- OIDC_USERNAME_ATTRIBUTE=Config(
- key="oidc_username_attribute",
- help=_("The attribute to be used as username when creating and looking up the user."),
- type=str,
- default="preferred_username"
- ),
- SUPERUSER_GROUP=Config(
- key="superuser_group",
- help=_("The group of users will be created and updated as superuser."),
- type=str,
- default=""
- ),
- )
- )
- LOCAL_FILESYSTEMS = UnspecifiedConfigSection(
- key="local_filesystems",
- help=_("Paths on the local file system that users should be able to browse."),
- each=ConfigSection(
- members=dict(
- PATH=Config("path",
- required=True,
- help=_("The path on the local filesystem.")))))
- def default_feedback_url():
- """A version-specific URL."""
- return "http://groups.google.com/a/cloudera.org/group/hue-user"
- FEEDBACK_URL = Config(
- key="feedback_url",
- help=_("Link for 'feedback' tab."),
- type=str,
- dynamic_default=default_feedback_url
- )
- SEND_DBUG_MESSAGES = Config(
- key="send_dbug_messages",
- help=_("Whether to send debug messages from JavaScript to the server logs."),
- type=coerce_bool,
- default=False
- )
- DATABASE_LOGGING = Config(
- key="database_logging",
- help=_("Enable or disable database debug mode."),
- type=coerce_bool,
- default=False
- )
- DJANGO_ADMINS = UnspecifiedConfigSection(
- key="django_admins",
- help=_("Administrators that should receive error emails."),
- each=ConfigSection(
- members=dict(
- NAME=Config("name",
- required=True,
- help=_("The full name of the admin.")),
- EMAIL=Config("email",
- required=True,
- help=_("The email address of the admin.")))))
- DJANGO_DEBUG_MODE = Config(
- key="django_debug_mode",
- help=_("Enable or disable debug mode."),
- type=coerce_bool,
- default=True
- )
- DEV = Config("dev",
- type=coerce_bool,
- default=False,
- help=_("Enable development mode, where notably static files are not cached.")
- )
- DISPLAY_APP_SWITCHER = Config(
- key='display_app_switcher',
- help=_('Enable or disable the upper left app switcher menu.'),
- type=coerce_bool,
- default=False
- )
- APP_SWITCHER_ALTUS_BASE_URL = Config(
- key="app_switcher_altus_base_url",
- help=_("Optional altus base url to use for the app switcher."),
- type=str,
- default=''
- )
- APP_SWITCHER_MOW_BASE_URL = Config(
- key="app_switcher_mow_base_url",
- help=_("Optional mow base url to use for the app switcher."),
- type=str,
- default=''
- )
- HTTP_500_DEBUG_MODE = Config(
- key='http_500_debug_mode',
- help=_('Enable or disable debugging information in the 500 internal server error response. '
- 'Note that the debugging information may contain sensitive data. '
- 'If django_debug_mode is True, this is automatically enabled.'),
- type=coerce_bool,
- default=True
- )
- def get_instrumentation_default():
- """If django_debug_mode is True, this is automatically enabled"""
- return DJANGO_DEBUG_MODE.get()
- INSTRUMENTATION = Config(
- key='instrumentation',
- help=_('Enable or disable instrumentation. If django_debug_mode is True, this is automatically enabled.'),
- type=coerce_bool,
- dynamic_default=get_instrumentation_default)
- AUDIT_EVENT_LOG_DIR = Config(
- key="audit_event_log_dir",
- help=_("The directory where to store the auditing logs. Auditing is disable if the value is empty."),
- type=str,
- dynamic_default=get_navigator_audit_log_dir
- )
- AUDIT_LOG_MAX_FILE_SIZE = Config(
- key="audit_log_max_file_size",
- help=_("Size in KB/MB/GB for audit log to rollover."),
- type=str,
- dynamic_default=get_navigator_audit_max_file_size
- )
- DJANGO_SERVER_EMAIL = Config(
- key='django_server_email',
- help=_('Email address that internal error messages should send as.'),
- default='hue@localhost.localdomain'
- )
- DJANGO_EMAIL_BACKEND = Config(
- key="django_email_backend",
- help=_("The email backend to use."),
- type=str,
- default="django.core.mail.backends.smtp.EmailBackend"
- )
- ENABLE_SQL_SYNTAX_CHECK = Config(
- key='enable_sql_syntax_check',
- default=True,
- type=coerce_bool,
- help=_('Choose whether to enable SQL syntax check or not.')
- )
- EDITOR_AUTOCOMPLETE_TIMEOUT = Config(
- key='editor_autocomplete_timeout',
- type=int,
- default=30000,
- help=_('Timeout value in ms for autocomplete of columns, tables, values etc. 0 = disabled.')
- )
- USE_NEW_EDITOR = Config( # To remove in Hue 4
- key='',
- default=True,
- type=coerce_bool,
- help=_('Choose whether to show the new SQL editor.')
- )
- ENABLE_DOWNLOAD = Config(
- key="enable_download",
- help=_(
- 'Global setting to allow or disable end user downloads in all Hue (e.g. Query result in editors and dashboard, file in File Browser browsers...).'),
- type=coerce_bool,
- default=True)
- ENABLE_DJANGO_DEBUG_TOOL = Config(
- key="enable_django_debug_tool",
- help=_('Allow use django debug tool with Chrome browser for debugging issue, django_debug_mode must be true also'),
- type=coerce_bool,
- default=False)
- DJANGO_DEBUG_TOOL_USERS = Config(
- key='django_debug_tool_users',
- default='',
- type=coerce_csv,
- help=_('Comma separated list of users that allow to use django debug tool. If it is empty, all users are allowed.')
- )
- USE_NEW_SIDE_PANELS = Config( # To remove in Hue 4
- key='use_new_side_panels',
- default=True,
- type=coerce_bool,
- help=_('Choose whether to show extended left and right panels.')
- )
- USE_DEFAULT_CONFIGURATION = Config(
- key='use_default_configuration',
- default=False,
- type=coerce_bool,
- help=_('Enable saved default configurations for Hive, Impala, Spark, and Oozie.')
- )
- USE_NEW_CHARTS = Config(
- key='use_new_charts',
- default=False,
- type=coerce_bool,
- help=_('Choose whether to use new charting library across the whole Hue.')
- )
- # Deprecated
- IS_MULTICLUSTER_ONLY = Config(
- key='is_multicluster_only',
- default=False,
- type=coerce_bool,
- help=_('Choose whether to pick configs only from [desktop] [[cluster]]')
- )
- # Deprecated
- IS_K8S_ONLY = Config(
- key='is_k8s_only',
- default=False,
- type=coerce_bool,
- help=_('Choose whether to pick configs only from [desktop] [[cluster]]')
- )
- ENABLE_ORGANIZATIONS = Config(
- key='enable_organizations',
- default=False,
- type=coerce_bool,
- help=_('Choose whether to allow multi tenancy or not.')
- )
- ENABLE_PROMETHEUS = Config(
- key='enable_prometheus',
- default=False,
- type=coerce_bool,
- help=_('Turn on Prometheus metrics end point /metrics.')
- )
- TRACING = ConfigSection(
- key="tracing",
- help=_("Tracing configuration."),
- members=dict(
- ENABLED= Config(
- key='enabled',
- default=False,
- type=coerce_bool,
- help=_('If tracing is enabled.')
- ),
- TRACE_ALL = Config(
- key='trace_all',
- default=False,
- type=coerce_bool,
- help=_('Trace all the requests instead of a few specific ones like the SQL Editor. Much noisiers.')
- ),
- ))
- def task_server_default_result_directory():
- """Local directory to store task results."""
- return 'file://%s' % get_run_root('logs')
- TASK_SERVER = ConfigSection(
- key="task_server",
- help=_("Task Server configuration."),
- members=dict(
- ENABLED= Config(
- key='enabled',
- default=False,
- type=coerce_bool,
- help=_('If resource intensive or blocking can be delegated to an already running task server.')
- ),
- BROKER_URL = Config(
- key='broker_url',
- default='amqp://guest:guest@localhost//',
- help=_('How the task server and tasks communicate.')
- ),
- CELERY_RESULT_BACKEND = Config(
- key='celery_result_backend',
- dynamic_default=task_server_default_result_directory,
- help=_('Where to store task results. Defaults to local file system path. Celery comes with a several other backends.')
- ),
- RESULT_CELERYD_OPTS = Config(
- key='celeryd_opts',
- default='--time-limit=300',
- help=_('Default options provided to the task server at startup.')
- ),
- BEAT_ENABLED = Config(
- key='beat_enabled',
- default=False,
- type=coerce_bool,
- help=_('Switch on the integration with the Task Scheduler.')
- ),
- BEAT_SCHEDULES_FILE = Config(
- key='beat_schedules_file',
- default='',
- type=str,
- help=_('Path to a file containing a list of beat schedules.')
- ),
- FETCH_RESULT_LIMIT = Config(
- key='fetch_result_limit',
- default=2000,
- type=coerce_positive_integer,
- help=_('Number of query results rows to fetch into the result storage.')
- ),
- RESULT_CACHE = Config(
- key='result_cache',
- type=str,
- help=_('Django file cache class to use to temporarily store query results'),
- default='{"BACKEND": "django_redis.cache.RedisCache", "LOCATION": "redis://localhost:6379/0", "OPTIONS": {"CLIENT_CLASS": "django_redis.client.DefaultClient"},"KEY_PREFIX": "queries"}'
- ),
- RESULT_STORAGE = Config(
- key='result_storage',
- type=str,
- help=_('Django file storage class to use to persist query results'),
- default='{"backend": "django.core.files.storage.FileSystemStorage", "properties": {"location": "./logs"}}'
- ),
- EXECUTION_STORAGE = Config(
- key='execution_storage',
- type=str,
- help=_('Django cache to use to store temporarily used data during query execution. This is in addition to result_file_storage and result_backend.'),
- default='{"BACKEND": "django.core.cache.backends.locmem.LocMemCache", "LOCATION": "celery-hue"}'
- ),
- ))
- def get_clusters(user):
- clusters = []
- cluster_config = CLUSTERS.get()
- # Backward compatibility when not using clusters
- if not cluster_config:
- clusters.append(
- (CLUSTER_ID.get(), {
- 'id': CLUSTER_ID.get(),
- 'name': CLUSTER_ID.get(),
- 'type': 'direct',
- 'credentials': {},
- }
- )
- )
- for i in cluster_config:
- # Get additional remote multi clusters
- clusters.append(
- (i, {
- 'id': i,
- 'name': cluster_config[i].NAME.get() or i,
- 'type': cluster_config[i].TYPE.get(),
- 'credentials': cluster_config[i].CREDENTIALS.get(),
- }
- )
- )
- return OrderedDict(clusters)
- def has_multi_clusters():
- '''If Hue is configured to talk to more than one completely independent clusters'''
- return len(CLUSTERS.get()) > 1
- def has_connectors():
- '''When the connector feature is turned on'''
- return ENABLE_CONNECTORS.get()
- CLUSTERS = UnspecifiedConfigSection(
- "clusters",
- help="One entry for each additional remote cluster Hue can interact with.",
- each=ConfigSection(
- help=_("Id of the cluster."),
- members=dict(
- NAME=Config(
- "name",
- help=_("Nice name of the cluster to show to the user. Same as id if not specified."),
- default=None,
- type=str,
- ),
- TYPE=Config(
- "type",
- help=_("Type of cluster, e.g. plain, CM, Snowball..."),
- default='direct',
- type=str,
- ),
- CREDENTIALS=Config(
- "credentials",
- help=_("How to connect to the of remote cluster management system."),
- default='{}',
- type=coerce_json_dict,
- )
- )
- )
- )
- ENABLE_CONNECTORS = Config(
- key='enable_connectors',
- default=False,
- type=coerce_bool,
- help=_('Turn on the Connector configuration and usage.')
- )
- CONNECTORS = UnspecifiedConfigSection(
- key='connectors',
- help=_("""Configuration options for connectors to external services"""),
- each=ConfigSection(
- help=_("Id of the connector."),
- members=dict(
- NICE_NAME=Config(
- "nice_name",
- help=_("Nice name of the connector to show to the user. Same as id if not specified."),
- default=None,
- type=str,
- ),
- DIALECT=Config(
- "dialect",
- help=_("The language or type of the integrated service. e.g. MySql, Hive, HDFS..."),
- default=None,
- type=str,
- ),
- INTERFACE=Config(
- "interface",
- help=_("The class of connector to use to connect to the service."),
- default=None,
- type=str,
- ),
- SETTINGS=Config(
- "settings",
- help=_("Json string of a list of name/value settings to configure the connector. e.g. '{\"name\": \"url\", \"value\": \"mysql://hue:hue@host:3306/hue\"}]'"),
- default='{}',
- type=coerce_json_dict,
- ),
- )
- )
- )
- def validate_ldap(user, config):
- res = []
- if config.SEARCH_BIND_AUTHENTICATION.get():
- if config.LDAP_URL.get() is not None:
- bind_dn = config.BIND_DN.get()
- bind_password = get_ldap_bind_password(config)
- if bool(bind_dn) != bool(bind_password):
- if bind_dn == None:
- res.append((LDAP.BIND_DN,
- new_str(_("If you set bind_password, then you must set bind_dn."))))
- else:
- res.append((LDAP.BIND_PASSWORD,
- new_str(_("If you set bind_dn, then you must set bind_password."))))
- else:
- if config.NT_DOMAIN.get() is not None or \
- config.LDAP_USERNAME_PATTERN.get() is not None:
- if config.LDAP_URL.get() is None:
- res.append((config.LDAP_URL,
- new_str(_("LDAP is only partially configured. An LDAP URL must be provided."))))
- if config.LDAP_URL.get() is not None:
- if config.NT_DOMAIN.get() is None and \
- config.LDAP_USERNAME_PATTERN.get() is None:
- res.append((config.LDAP_URL,
- new_str(_("LDAP is only partially configured. An NT Domain or username "
- "search pattern must be provided."))))
- if config.LDAP_USERNAME_PATTERN.get() is not None and \
- '<username>' not in config.LDAP_USERNAME_PATTERN.get():
- res.append((config.LDAP_USERNAME_PATTERN,
- new_str(_("The LDAP username pattern should contain the special"
- "<username> replacement string for authentication."))))
- return res
- def validate_database(user):
- res = []
- cursor = connection.cursor()
- if connection.vendor == 'mysql':
- try:
- innodb_table_count = cursor.execute('''
- SELECT *
- FROM information_schema.tables
- WHERE table_schema=DATABASE() AND engine = "innodb"''')
- total_table_count = cursor.execute('''
- SELECT *
- FROM information_schema.tables
- WHERE table_schema=DATABASE()''')
- # Promote InnoDB storage engine
- if innodb_table_count != total_table_count:
- res.append(('PREFERRED_STORAGE_ENGINE', new_str(_('''We recommend MySQL InnoDB engine over
- MyISAM which does not support transactions.'''))))
- if innodb_table_count != 0 and innodb_table_count != total_table_count:
- res.append(('MYSQL_STORAGE_ENGINE', new_str(_('''All tables in the database must be of the same
- storage engine type (preferably InnoDB).'''))))
- except Exception as ex:
- LOG.exception("Error in config validation of MYSQL_STORAGE_ENGINE: %s", ex)
- elif 'sqlite' in connection.vendor:
- res.append(('SQLITE_NOT_FOR_PRODUCTION_USE', new_str(_('SQLite is only recommended for development environments. '
- 'It might cause the "Database is locked" error. Migrating to MySQL, Oracle or PostgreSQL is strongly recommended.'))))
- # Check if django_migrations table is up to date
- try:
- from desktop import appmanager
- cursor.execute('''SELECT * from django_migrations''')
- migration_history_entries = [(entry[1], entry[2]) for entry in cursor.fetchall()]
- apps = appmanager.get_apps(user)
- apps.append(appmanager.get_desktop_module('desktop'))
- missing_migration_entries = []
- for app in apps:
- if app.migrations_path:
- for migration_file_name in glob.iglob(app.migrations_path + '/*.py'):
- migration_name = os.path.splitext(os.path.basename(migration_file_name))[0]
- if migration_name != "__init__" and (app.name, migration_name) not in migration_history_entries:
- missing_migration_entries.append((app.name, migration_name))
- if missing_migration_entries:
- res.append(('django_migrations', new_str(_('''django_migrations table seems to be corrupted or incomplete.
- %s entries are missing in the table: %s''') % (len(missing_migration_entries), missing_migration_entries))))
- except Exception:
- LOG.exception("Error in config validation of django_migrations")
- return res
- def config_validator(user):
- """
- config_validator() -> [ (config_variable, error_message) ]
- Called by core check_config() view.
- """
- from beeswax.models import QueryHistory, SavedQuery, Session
- from desktop.lib import i18n
- from desktop.models import Document, Document2 # Avoid cyclic loop
- from desktop.settings import DOCUMENT2_MAX_ENTRIES # Avoid cyclic loop
- from oozie.models import Job
- res = []
- doc_count = Document.objects.count()
- if doc_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('DOCUMENT_CLEANUP_WARNING', new_str(_('Desktop Document has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, doc_count)))))
- doc2_count = Document2.objects.count()
- if doc2_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('DOCUMENT2_CLEANUP_WARNING', new_str(_('Desktop Document2 has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, doc2_count)))))
- session_count = Session.objects.count()
- if session_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('SESSION_CLEANUP_WARNING', new_str(_('Desktop Session has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, session_count)))))
- qh_count = QueryHistory.objects.count()
- if qh_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('QueryHistory_CLEANUP_WARNING', new_str(_('Query History has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, qh_count)))))
- sq_count = SavedQuery.objects.count()
- if sq_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('SavedQuery_CLEANUP_WARNING', new_str(_('Saved Query has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, sq_count)))))
- job_count = Job.objects.count()
- if job_count > DOCUMENT2_MAX_ENTRIES:
- res.append(('OOZIEJOB_CLEANUP_WARNING', new_str(_('Oozie Job has more than %d entries: %d, '
- 'please run "hue desktop_document_cleanup --cm-managed" to remove old entries' % (DOCUMENT2_MAX_ENTRIES, job_count)))))
- if not get_secret_key():
- res.append((SECRET_KEY, new_str(_("Secret key should be configured as a random string. All sessions will be lost on restart"))))
- # Validate SSL setup
- if SSL_CERTIFICATE.get():
- res.extend(validate_path(SSL_CERTIFICATE, is_dir=False))
- if not SSL_PRIVATE_KEY.get():
- res.append((SSL_PRIVATE_KEY, new_str(_("SSL private key file should be set to enable HTTPS."))))
- else:
- res.extend(validate_path(SSL_PRIVATE_KEY, is_dir=False))
- # Validate encoding
- if not i18n.validate_encoding(DEFAULT_SITE_ENCODING.get()):
- res.append((DEFAULT_SITE_ENCODING, new_str(_("Encoding not supported."))))
- # Validate kerberos
- if KERBEROS.HUE_KEYTAB.get() is not None:
- res.extend(validate_path(KERBEROS.HUE_KEYTAB, is_dir=False))
- # Keytab should not be world or group accessible
- kt_stat = os.stat(KERBEROS.HUE_KEYTAB.get())
- if stat.S_IMODE(kt_stat.st_mode) & 0o077:
- res.append((KERBEROS.HUE_KEYTAB,
- force_unicode(_("Keytab should have 0600 permissions (has %o).") %
- stat.S_IMODE(kt_stat.st_mode))))
- res.extend(validate_path(KERBEROS.KINIT_PATH, is_dir=False))
- res.extend(validate_path(KERBEROS.CCACHE_PATH, is_dir=False))
- if LDAP.LDAP_SERVERS.get():
- for ldap_record_key in LDAP.LDAP_SERVERS.get():
- res.extend(validate_ldap(user, LDAP.LDAP_SERVERS.get()[ldap_record_key]))
- else:
- res.extend(validate_ldap(user, LDAP))
- # Validate MYSQL storage engine of all tables
- res.extend(validate_database(user))
- # Validate if oozie email server is active
- try:
- from oozie.views.editor2 import _is_oozie_mail_enabled
- if not _is_oozie_mail_enabled(user):
- res.append(('OOZIE_EMAIL_SERVER', new_str(_('Email notifications is disabled for Workflows and Jobs as SMTP server is localhost.'))))
- except Exception as e:
- LOG.warn('Config check failed because Oozie app not installed %s' % e)
- from notebook.models import make_notebook
- from notebook.api import _save_notebook
- notebook = make_notebook(name='test', editor_type='hive', statement='select "ทดสอบ"', status='ready')
- notebook_doc = None
- try:
- notebook_doc, save_as = _save_notebook(notebook.get_data(), user)
- except:
- res.append(('DATABASE_CHARACTER_SET', new_str(_('Character set of <i>search</i> field in <i>desktop_document2</i> table is not UTF-8. <br>'
- '<b>NOTE:</b> Configure the database for character set AL32UTF8 and national character set UTF8.'))))
- if notebook_doc:
- notebook_doc.delete()
- if 'use_new_editor' in USE_NEW_EDITOR.bind_to:
- res.append(('[desktop] use_new_editor', new_str(_('This configuration flag has been deprecated.'))))
- return res
- def get_redaction_policy():
- """
- Return the configured redaction policy.
- """
- return LOG_REDACTION_FILE.get()
- def get_secret_key():
- secret_key = os.environ.get('HUE_SECRET_KEY')
- if secret_key is not None:
- return secret_key
- secret_key = SECRET_KEY.get()
- if not secret_key:
- secret_key = SECRET_KEY_SCRIPT.get()
- return secret_key
- def get_ssl_password():
- password = os.environ.get('HUE_SSL_PASSWORD')
- if password is not None:
- return password
- password = SSL_PASSWORD.get()
- if not password:
- password = SSL_PASSWORD_SCRIPT.get()
- return password
- def get_database_password():
- password = os.environ.get('HUE_DATABASE_PASSWORD')
- if password is not None:
- return password
- password = DATABASE.PASSWORD.get()
- if not password:
- password = DATABASE.PASSWORD_SCRIPT.get()
- return password
- def get_smtp_password():
- password = os.environ.get('HUE_SMTP_PASSWORD')
- if password is not None:
- return password
- password = SMTP.PASSWORD.get()
- if not password:
- password = SMTP.PASSWORD_SCRIPT.get()
- return password
- def get_ldap_bind_password(ldap_config):
- password = os.environ.get('HUE_LDAP_BIND_PASSWORD')
- if password is not None:
- return password
- password = ldap_config.BIND_PASSWORD.get()
- if not password:
- password = ldap_config.BIND_PASSWORD_SCRIPT.get()
- return password
- PERMISSION_ACTION_GS = "gs_access"
- GC_ACCOUNTS = UnspecifiedConfigSection(
- 'gc_accounts',
- help=_('One entry for each GC account'),
- each=ConfigSection(
- help=_('Information about single GC account'),
- members=dict(
- JSON_CREDENTIALS=Config(
- key='json_credentials',
- type=str,
- default=None,
- )
- )
- )
- )
- def is_gs_enabled():
- from desktop.lib.idbroker import conf as conf_idbroker # Circular dependencies desktop.conf -> idbroker.conf -> desktop.conf
- return ('default' in list(GC_ACCOUNTS.keys()) and GC_ACCOUNTS['default'].JSON_CREDENTIALS.get()) or conf_idbroker.is_idbroker_enabled('gs')
- def has_gs_access(user):
- from desktop.auth.backend import is_admin
- return user.is_authenticated() and user.is_active and (is_admin(user) or user.has_hue_permission(action="gs_access", app="filebrowser"))
|