Loading HuntDB...

Open Github Repo Leaking WEBLATE SECRET KEY

None
W
Weblate
Submitted None
Reported by nafisaqil

Vulnerability Details

Technical details and impact analysis

Cleartext Storage of Sensitive Information
Team, While going through Github search I discovered a public repository which contains Weblate Secret Key #Issue & Poc: #Repo: https://github.com/WeblateOrg #File:https://github.com/WeblateOrg/weblate/blob/592472958f7b847701c51b36f4768b9784219fa1/weblate/settings_docker.py #SECRET_KEY = os.environ.get( "WEBLATE_SECRET_KEY", "jm8fqjlg+5!#xu%e-oh#7!$aa7!6avf7ud*_v=chdrb9qdco6(" ) #Full Source Code: # # Copyright © 2012 - 2020 Michal Čihař <[email protected]> # # This file is part of Weblate <https://weblate.org/> # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <https://www.gnu.org/licenses/>. # import os from logging.handlers import SysLogHandler from django.core.exceptions import PermissionDenied from django.http import Http404 from weblate.utils.environment import ( get_env_bool, get_env_int, get_env_list, get_env_map, modify_env_list, ) # # Django settings for Weblate project. # DEBUG = get_env_bool("WEBLATE_DEBUG", True) ADMINS = ((os.environ["WEBLATE_ADMIN_NAME"], os.environ["WEBLATE_ADMIN_EMAIL"]),) MANAGERS = ADMINS DATABASES = { "default": { # Use 'postgresql' or 'mysql'. "ENGINE": "django.db.backends.postgresql", # Database name. "NAME": os.environ["POSTGRES_DATABASE"], # Database user. "USER": os.environ["POSTGRES_USER"], # Database password. "PASSWORD": os.environ["POSTGRES_PASSWORD"], # Set to empty string for localhost. "HOST": os.environ["POSTGRES_HOST"], # Set to empty string for default. "PORT": os.environ["POSTGRES_PORT"], # Customizations for databases. "OPTIONS": {"sslmode": os.environ.get("POSTGRES_SSL_MODE", "prefer")}, } } BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) # Data directory DATA_DIR = os.environ.get("WEBLATE_DATA_DIR", "/app/data") # Local time zone for this installation. Choices can be found here: # http://en.wikipedia.org/wiki/List_of_tz_zones_by_name # although not all choices may be available on all operating systems. # In a Windows environment this must be set to your system time zone. TIME_ZONE = os.environ.get("WEBLATE_TIME_ZONE", "UTC") # Language code for this installation. All choices can be found here: # http://www.i18nguy.com/unicode/language-identifiers.html LANGUAGE_CODE = "en-us" LANGUAGES = ( ("ar", "العربية"), ("az", "Azərbaycan"), ("be", "Беларуская"), ("be@latin", "Biełaruskaja"), ("bg", "Български"), ("br", "Brezhoneg"), ("ca", "Català"), ("cs", "Čeština"), ("da", "Dansk"), ("de", "Deutsch"), ("en", "English"), ("el", "Ελληνικά"), ("en-gb", "English (United Kingdom)"), ("es", "Español"), ("fi", "Suomi"), ("fr", "Français"), ("gl", "Galego"), ("he", "עברית"), ("hu", "Magyar"), ("hr", "Hrvatski"), ("id", "Indonesia"), ("it", "Italiano"), ("ja", "日本語"), ("kab", "Taqbaylit"), ("kk", "Қазақ тілі"), ("ko", "한국어"), ("nb", "Norsk bokmål"), ("nl", "Nederlands"), ("pl", "Polski"), ("pt", "Português"), ("pt-br", "Português brasileiro"), ("ru", "Русский"), ("sk", "Slovenčina"), ("sl", "Slovenščina"), ("sq", "Shqip"), ("sr", "Српски"), ("sv", "Svenska"), ("tr", "Türkçe"), ("uk", "Українська"), ("zh-hans", "简体字"), ("zh-hant", "正體字"), ) SITE_ID = 1 # If you set this to False, Django will make some optimizations so as not # to load the internationalization machinery. USE_I18N = True # If you set this to False, Django will not format dates, numbers and # calendars according to the current locale. USE_L10N = True # If you set this to False, Django will not use timezone-aware datetimes. USE_TZ = True # URL prefix to use, please see documentation for more details URL_PREFIX = os.environ.get("WEBLATE_URL_PREFIX", "") # Absolute filesystem path to the directory that will hold user-uploaded files. MEDIA_ROOT = os.path.join(DATA_DIR, "media") # URL that handles the media served from MEDIA_ROOT. Make sure to use a # trailing slash. MEDIA_URL = f"{URL_PREFIX}/media/" # Absolute path to the directory static files should be collected to. # Don't put anything in this directory yourself; store your static files # in apps' "static/" subdirectories and in STATICFILES_DIRS. STATIC_ROOT = os.path.join(DATA_DIR, "static") # URL prefix for static files. STATIC_URL = f"{URL_PREFIX}/static/" # Additional locations of static files STATICFILES_DIRS = ( # Put strings here, like "/home/html/static" or "C:/www/django/static". # Always use forward slashes, even on Windows. # Don't forget to use absolute paths, not relative paths. ) # List of finder classes that know how to find static files in # various locations. STATICFILES_FINDERS = ( "django.contrib.staticfiles.finders.FileSystemFinder", "django.contrib.staticfiles.finders.AppDirectoriesFinder", "compressor.finders.CompressorFinder", ) # Make this unique, and don't share it with anybody. # You can generate it using weblate/examples/generate-secret-key try: with open("/app/data/secret", "r") as handle: SECRET_KEY = handle.read() except IOError: SECRET_KEY = os.environ.get( "WEBLATE_SECRET_KEY", "jm8fqjlg+5!#xu%e-oh#7!$aa7!6avf7ud*_v=chdrb9qdco6(" ) _TEMPLATE_LOADERS = [ "django.template.loaders.filesystem.Loader", "django.template.loaders.app_directories.Loader", ] if not DEBUG: _TEMPLATE_LOADERS = [("django.template.loaders.cached.Loader", _TEMPLATE_LOADERS)] TEMPLATES = [ { "BACKEND": "django.template.backends.django.DjangoTemplates", "OPTIONS": { "context_processors": [ "django.contrib.auth.context_processors.auth", "django.template.context_processors.debug", "django.template.context_processors.i18n", "django.template.context_processors.request", "django.template.context_processors.csrf", "django.contrib.messages.context_processors.messages", "weblate.trans.context_processors.weblate_context", ], "loaders": _TEMPLATE_LOADERS, }, } ] # GitHub username for sending pull requests. # Please see the documentation for more details. GITHUB_USERNAME = os.environ.get("WEBLATE_GITHUB_USERNAME", None) # GitLab username for sending merge requests. # Please see the documentation for more details. GITLAB_USERNAME = os.environ.get("WEBLATE_GITLAB_USERNAME", None) # Authentication configuration AUTHENTICATION_BACKENDS = () # Custom user model AUTH_USER_MODEL = "weblate_auth.User" if "WEBLATE_NO_EMAIL_AUTH" not in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.email.EmailAuth",) if "WEBLATE_SOCIAL_AUTH_GITHUB_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.github.GithubOAuth2",) # Social auth backends setup SOCIAL_AUTH_GITHUB_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_GITHUB_KEY", "") SOCIAL_AUTH_GITHUB_SECRET = os.environ.get("WEBLATE_SOCIAL_AUTH_GITHUB_SECRET", "") SOCIAL_AUTH_GITHUB_SCOPE = ["user:email"] if "WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.bitbucket.BitbucketOAuth",) SOCIAL_AUTH_BITBUCKET_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY", "") SOCIAL_AUTH_BITBUCKET_SECRET = os.environ.get( "WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET", "" ) SOCIAL_AUTH_BITBUCKET_VERIFIED_EMAILS_ONLY = True if "WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.facebook.FacebookOAuth2",) SOCIAL_AUTH_FACEBOOK_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY", "") SOCIAL_AUTH_FACEBOOK_SECRET = os.environ.get("WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET", "") SOCIAL_AUTH_FACEBOOK_SCOPE = ["email", "public_profile"] SOCIAL_AUTH_FACEBOOK_PROFILE_EXTRA_PARAMS = {"fields": "id,name,email"} SOCIAL_AUTH_FACEBOOK_API_VERSION = "3.1" if "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.google.GoogleOAuth2",) SOCIAL_AUTH_GOOGLE_OAUTH2_KEY = os.environ.get( "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY", "" ) SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET = os.environ.get( "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET", "" ) SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS = get_env_list( "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS", "" ) SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS = get_env_list( "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS", "" ) if "WEBLATE_SOCIAL_AUTH_GITLAB_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.gitlab.GitLabOAuth2",) if "WEBLATE_SOCIAL_AUTH_GITLAB_API_URL" in os.environ: SOCIAL_AUTH_GITLAB_API_URL = os.environ.get("WEBLATE_SOCIAL_AUTH_GITLAB_API_URL") SOCIAL_AUTH_GITLAB_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_GITLAB_KEY", "") SOCIAL_AUTH_GITLAB_SECRET = os.environ.get("WEBLATE_SOCIAL_AUTH_GITLAB_SECRET", "") SOCIAL_AUTH_GITLAB_SCOPE = ["read_user"] if "WEBLATE_SOCIAL_AUTH_AUTH0_KEY" in os.environ: SOCIAL_AUTH_AUTH0_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_AUTH0_KEY", "") SOCIAL_AUTH_AUTH0_SECRET = os.environ.get("WEBLATE_SOCIAL_AUTH_AUTH0_SECRET", "") SOCIAL_AUTH_AUTH0_DOMAIN = os.environ.get("WEBLATE_SOCIAL_AUTH_AUTH0_DOMAIN", "") SOCIAL_AUTH_AUTH0_TITLE = os.environ.get("WEBLATE_SOCIAL_AUTH_AUTH0_TITLE", "") SOCIAL_AUTH_AUTH0_IMAGE = os.environ.get("WEBLATE_SOCIAL_AUTH_AUTH0_IMAGE", "") AUTHENTICATION_BACKENDS += ("social_core.backends.auth0.Auth0OAuth2",) SOCIAL_AUTH_AUTH0_SCOPE = ["openid", "profile", "email"] if "WEBLATE_SOCIAL_AUTH_AUTH0_AUTH_EXTRA_ARGUMENTS" in os.environ: SOCIAL_AUTH_AUTH0_AUTH_EXTRA_ARGUMENTS = get_env_map( "WEBLATE_SOCIAL_AUTH_AUTH0_AUTH_EXTRA_ARGUMENTS" ) # SAML if "WEBLATE_SAML_IDP_URL" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.saml.SAMLAuth",) # The keys are generated on container startup if missing with open("/app/data/ssl/saml.crt", "r") as handle: SOCIAL_AUTH_SAML_SP_PUBLIC_CERT = handle.read() with open("/app/data/ssl/saml.key", "r") as handle: SOCIAL_AUTH_SAML_SP_PRIVATE_KEY = handle.read() # Identity Provider SOCIAL_AUTH_SAML_ENABLED_IDPS = { "weblate": { "entity_id": os.environ.get("WEBLATE_SAML_IDP_ENTITY_ID", ""), "url": os.environ.get("WEBLATE_SAML_IDP_URL", ""), "x509cert": os.environ.get("WEBLATE_SAML_IDP_X509CERT", ""), "attr_name": "full_name", "attr_username": "username", "attr_email": "email", } } # Azure if "WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.azuread.AzureADOAuth2",) SOCIAL_AUTH_AZUREAD_OAUTH2_KEY = os.environ.get( "WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY", "" ) SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET = os.environ.get( "WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET", "" ) # Azure AD Tenant if "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY" in os.environ: AUTHENTICATION_BACKENDS += ( "social_core.backends.azuread_tenant.AzureADTenantOAuth2", ) SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY = os.environ.get( "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY", "" ) SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET = os.environ.get( "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET", "" ) SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID = os.environ.get( "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID", "" ) # Keycloak if "WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.keycloak.KeycloakOAuth2",) SOCIAL_AUTH_KEYCLOAK_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY", "") SOCIAL_AUTH_KEYCLOAK_SECRET = os.environ.get( "WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET", "" ) SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY = os.environ.get( "WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY", "" ) SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL = os.environ.get( "WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL", "" ) SOCIAL_AUTH_KEYCLOAK_ALGORITHM = os.environ.get( "WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM", "" ) SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL = os.environ.get( "WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL", "" ) SOCIAL_AUTH_KEYCLOAK_ID_KEY = "email" # Linux distros if "WEBLATE_SOCIAL_AUTH_FEDORA" in os.environ: AUTHENTICATION_BACKENDS += "social_core.backends.fedora.FedoraOpenId" if "WEBLATE_SOCIAL_AUTH_OPENSUSE" in os.environ: AUTHENTICATION_BACKENDS += "social_core.backends.suse.OpenSUSEOpenId" SOCIAL_AUTH_OPENSUSE_FORCE_EMAIL_VALIDATION = True if "WEBLATE_SOCIAL_AUTH_UBUNTU" in os.environ: AUTHENTICATION_BACKENDS += "social_core.backends.ubuntu.UbuntuOpenId" # Slack if "WEBLATE_SOCIAL_AUTH_SLACK_KEY" in os.environ: AUTHENTICATION_BACKENDS += ("social_core.backends.slack.SlackOAuth2",) SOCIAL_AUTH_SLACK_KEY = os.environ.get("WEBLATE_SOCIAL_AUTH_SLACK_KEY", "") SOCIAL_AUTH_SLACK_SECRET = os.environ.get("WEBLATE_SOCIAL_AUTH_SLACK_SECRET", "") # https://docs.weblate.org/en/latest/admin/auth.html#ldap-authentication if "WEBLATE_AUTH_LDAP_SERVER_URI" in os.environ: import ldap from django_auth_ldap.config import LDAPSearch AUTH_LDAP_SERVER_URI = os.environ.get("WEBLATE_AUTH_LDAP_SERVER_URI") AUTH_LDAP_USER_DN_TEMPLATE = ( os.environ.get("WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE") or None ) AUTHENTICATION_BACKENDS += ("django_auth_ldap.backend.LDAPBackend",) AUTH_LDAP_USER_ATTR_MAP = get_env_map( "WEBLATE_AUTH_LDAP_USER_ATTR_MAP", {"full_name": "name", "email": "mail"} ) AUTH_LDAP_BIND_DN = os.environ.get("WEBLATE_AUTH_LDAP_BIND_DN", "") AUTH_LDAP_BIND_PASSWORD = os.environ.get("WEBLATE_AUTH_LDAP_BIND_PASSWORD", "") if "WEBLATE_AUTH_LDAP_USER_SEARCH" in os.environ: AUTH_LDAP_USER_SEARCH = LDAPSearch( os.environ["WEBLATE_AUTH_LDAP_USER_SEARCH"], ldap.SCOPE_SUBTREE, os.environ.get("WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER", "(uid=%(user)s)"), ) if not get_env_bool("WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS", True): AUTH_LDAP_CONNECTION_OPTIONS = { ldap.OPT_REFERRALS: 0, } # Always include Weblate backend AUTHENTICATION_BACKENDS += ("weblate.accounts.auth.WeblateUserBackend",) # Social auth settings SOCIAL_AUTH_PIPELINE = ( "social_core.pipeline.social_auth.social_details", "social_core.pipeline.social_auth.social_uid", "social_core.pipeline.social_auth.auth_allowed", "social_core.pipeline.social_auth.social_user", "weblate.accounts.pipeline.store_params", "weblate.accounts.pipeline.verify_open", "social_core.pipeline.user.get_username", "weblate.accounts.pipeline.require_email", "social_core.pipeline.mail.mail_validation", "weblate.accounts.pipeline.revoke_mail_code", "weblate.accounts.pipeline.ensure_valid", "weblate.accounts.pipeline.remove_account", "social_core.pipeline.social_auth.associate_by_email", "weblate.accounts.pipeline.reauthenticate", "weblate.accounts.pipeline.verify_username", "social_core.pipeline.user.create_user", "social_core.pipeline.social_auth.associate_user", "social_core.pipeline.social_auth.load_extra_data", "weblate.accounts.pipeline.cleanup_next", "weblate.accounts.pipeline.user_full_name", "weblate.accounts.pipeline.store_email", "weblate.accounts.pipeline.notify_connect", "weblate.accounts.pipeline.password_reset", ) SOCIAL_AUTH_DISCONNECT_PIPELINE = ( "social_core.pipeline.disconnect.allowed_to_disconnect", "social_core.pipeline.disconnect.get_entries", "social_core.pipeline.disconnect.revoke_tokens", "weblate.accounts.pipeline.cycle_session", "weblate.accounts.pipeline.adjust_primary_mail", "weblate.accounts.pipeline.notify_disconnect", "social_core.pipeline.disconnect.disconnect", "weblate.accounts.pipeline.cleanup_next", ) # Custom authentication strategy SOCIAL_AUTH_STRATEGY = "weblate.accounts.strategy.WeblateStrategy" # Raise exceptions so that we can handle them later SOCIAL_AUTH_RAISE_EXCEPTIONS = True SOCIAL_AUTH_EMAIL_VALIDATION_FUNCTION = "weblate.accounts.pipeline.send_validation" SOCIAL_AUTH_EMAIL_VALIDATION_URL = "{0}/accounts/email-sent/".format(URL_PREFIX) SOCIAL_AUTH_LOGIN_ERROR_URL = "{0}/accounts/login/".format(URL_PREFIX) SOCIAL_AUTH_EMAIL_FORM_URL = "{0}/accounts/email/".format(URL_PREFIX) SOCIAL_AUTH_NEW_ASSOCIATION_REDIRECT_URL = "{0}/accounts/profile/#account".format( URL_PREFIX ) SOCIAL_AUTH_PROTECTED_USER_FIELDS = ("email",) SOCIAL_AUTH_SLUGIFY_USERNAMES = True SOCIAL_AUTH_SLUGIFY_FUNCTION = "weblate.accounts.pipeline.slugify_username" # Password validation configuration AUTH_PASSWORD_VALIDATORS = [ { "NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator" # noqa: E501, pylint: disable=line-too-long }, { "NAME": "django.contrib.auth.password_validation.MinimumLengthValidator", "OPTIONS": {"min_length": 10}, }, {"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator"}, {"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator"}, {"NAME": "weblate.accounts.password_validation.CharsPasswordValidator"}, {"NAME": "weblate.accounts.password_validation.PastPasswordsValidator"}, # Optional password strength validation by django-zxcvbn-password # { # "NAME": "zxcvbn_password.ZXCVBNValidator", # "OPTIONS": { # "min_score": 3, # "user_attributes": ("username", "email", "full_name") # } # }, ] # Allow new user registrations REGISTRATION_OPEN = get_env_bool("WEBLATE_REGISTRATION_OPEN", True) REGISTRATION_ALLOW_BACKENDS = get_env_list("WEBLATE_REGISTRATION_ALLOW_BACKENDS") # Email registration filter REGISTRATION_EMAIL_MATCH = os.environ.get("WEBLATE_REGISTRATION_EMAIL_MATCH", ".*") # Shortcut for login required setting REQUIRE_LOGIN = get_env_bool("WEBLATE_REQUIRE_LOGIN", False) # Middleware MIDDLEWARE = [ "weblate.middleware.RedirectMiddleware", "weblate.middleware.ProxyMiddleware", "django.middleware.security.SecurityMiddleware", "django.contrib.sessions.middleware.SessionMiddleware", "django.middleware.common.CommonMiddleware", "django.middleware.csrf.CsrfViewMiddleware", "weblate.accounts.middleware.AuthenticationMiddleware", "django.contrib.messages.middleware.MessageMiddleware", "django.middleware.clickjacking.XFrameOptionsMiddleware", "social_django.middleware.SocialAuthExceptionMiddleware", "weblate.accounts.middleware.RequireLoginMiddleware", "weblate.api.middleware.ThrottlingMiddleware", "weblate.middleware.SecurityMiddleware", ] # Rollbar integration if "ROLLBAR_KEY" in os.environ: MIDDLEWARE.append("rollbar.contrib.django.middleware.RollbarNotifierMiddleware") ROLLBAR = { "access_token": os.environ["ROLLBAR_KEY"], "environment": os.environ.get("ROLLBAR_ENVIRONMENT", "production"), "branch": "master", "root": "/usr/local/lib/python3.7/dist-packages/weblate/", "exception_level_filters": [ (PermissionDenied, "ignored"), (Http404, "ignored"), ], } ROOT_URLCONF = "weblate.urls" # Django and Weblate apps INSTALLED_APPS = [ # Docker customization app, listed first to allow overriding static files "customize", # Weblate apps on top to override Django locales and templates "weblate.addons", "weblate.auth", "weblate.checks", "weblate.formats", "weblate.glossary", "weblate.machinery", "weblate.trans", "weblate.lang", "weblate.langdata", "weblate.memory", "weblate.screenshots", "weblate.fonts", "weblate.accounts", "weblate.utils", "weblate.vcs", "weblate.wladmin", "weblate", # Optional: Git exporter "weblate.gitexport", # Standard Django modules "django.contrib.auth", "django.contrib.contenttypes", "django.contrib.sessions", "django.contrib.sites", "django.contrib.messages", "django.contrib.staticfiles", "django.contrib.admin.apps.SimpleAdminConfig", "django.contrib.admindocs", "django.contrib.sitemaps", "django.contrib.humanize", # Third party Django modules "social_django", "crispy_forms", "compressor", "rest_framework", "rest_framework.authtoken", "django_filters", ] modify_env_list(INSTALLED_APPS, "APPS") # Custom exception reporter to include some details DEFAULT_EXCEPTION_REPORTER_FILTER = "weblate.trans.debug.WeblateExceptionReporterFilter" # Default logging of Weblate messages # - to syslog in production (if available) # - otherwise to console # - you can also choose "logfile" to log into separate file # after configuring it below # Detect if we can connect to syslog HAVE_SYSLOG = False if DEBUG or not HAVE_SYSLOG: DEFAULT_LOG = "console" else: DEFAULT_LOG = "syslog" DEFAULT_LOGLEVEL = os.environ.get("WEBLATE_LOGLEVEL", "DEBUG" if DEBUG else "INFO") # A sample logging configuration. The only tangible logging # performed by this configuration is to send an email to # the site admins on every HTTP 500 error when DEBUG=False. # See http://docs.djangoproject.com/en/stable/topics/logging for # more details on how to customize your logging configuration. LOGGING = { "version": 1, "disable_existing_loggers": True, "filters": {"require_debug_false": {"()": "django.utils.log.RequireDebugFalse"}}, "formatters": { "syslog": {"format": "weblate[%(process)d]: %(levelname)s %(message)s"}, "simple": {"format": "%(levelname)s %(message)s"}, "logfile": {"format": "%(asctime)s %(levelname)s %(message)s"}, "django.server": { "()": "django.utils.log.ServerFormatter", "format": "[%(server_time)s] %(message)s", }, }, "handlers": { "mail_admins": { "level": "ERROR", "filters": ["require_debug_false"], "class": "django.utils.log.AdminEmailHandler", "include_html": True, }, "console": { "level": "DEBUG", "class": "logging.StreamHandler", "formatter": "simple", }, "django.server": { "level": "INFO", "class": "logging.StreamHandler", "formatter": "django.server", }, "syslog": { "level": "DEBUG", "class": "logging.handlers.SysLogHandler", "formatter": "syslog", "address": "/dev/log", "facility": SysLogHandler.LOG_LOCAL2, }, # Logging to a file # "logfile": { # "level":"DEBUG", # "class":"logging.handlers.RotatingFileHandler", # "filename": "/var/log/weblate/weblate.log", # "maxBytes": 100000, # "backupCount": 3, # "formatter": "logfile", # }, }, "loggers": { "django.request": { "handlers": ["mail_admins", DEFAULT_LOG], "level": "ERROR", "propagate": True, }, "django.server": { "handlers": ["django.server"], "level": "INFO", "propagate": False, }, # Logging database queries # "django.db.backends": { # "handlers": [DEFAULT_LOG], # "level": "DEBUG", # }, "weblate": {"handlers": [DEFAULT_LOG], "level": DEFAULT_LOGLEVEL}, # Logging VCS operations "weblate.vcs": {"handlers": [DEFAULT_LOG], "level": "INFO"}, # Python Social Auth "social": {"handlers": [DEFAULT_LOG], "level": DEFAULT_LOGLEVEL}, # Django Authentication Using LDAP "django_auth_ldap": {"handlers": [DEFAULT_LOG], "level": DEFAULT_LOGLEVEL}, }, } # Remove syslog setup if it's not present if not HAVE_SYSLOG: del LOGGING["handlers"]["syslog"] # List of machine translations MT_SERVICES = ( "weblate.machinery.weblatetm.WeblateTranslation", "weblate.memory.machine.WeblateMemory", ) # Machine translation API keys # URL of the Apertium APy server MT_APERTIUM_APY = None # AWS MT_AWS_REGION = os.environ.get("WEBLATE_MT_AWS_REGION", None) MT_AWS_ACCESS_KEY_ID = os.environ.get("WEBLATE_MT_AWS_ACCESS_KEY_ID", None) MT_AWS_SECRET_ACCESS_KEY = os.environ.get("WEBLATE_MT_AWS_SECRET_ACCESS_KEY", None) if MT_AWS_ACCESS_KEY_ID: MT_SERVICES += ("weblate.machinery.aws.AWSTranslation",) # DeepL API key MT_DEEPL_KEY = os.environ.get("WEBLATE_MT_DEEPL_KEY", None) MT_DEEPL_API_VERSION = os.environ.get("WEBLATE_MT_DEEPL_API_VERSION", "v2") if MT_DEEPL_KEY: MT_SERVICES += ("weblate.machinery.deepl.DeepLTranslation",) # Microsoft Cognitive Services Translator API, register at # https://portal.azure.com/ MT_MICROSOFT_COGNITIVE_KEY = os.environ.get("WEBLATE_MT_MICROSOFT_COGNITIVE_KEY", None) MT_MICROSOFT_REGION = None ms_endpoint_url = os.environ.get("WEBLATE_MT_MICROSOFT_ENDPOINT_URL", None) if ms_endpoint_url is not None: MT_MICROSOFT_ENDPOINT_URL = ms_endpoint_url ms_base_url = os.environ.get("WEBLATE_MT_MICROSOFT_BASE_URL", None) if ms_base_url is not None: MT_MICROSOFT_BASE_URL = ms_base_url if MT_MICROSOFT_COGNITIVE_KEY: MT_SERVICES += ("weblate.machinery.microsoft.MicrosoftCognitiveTranslation",) # ModernMT MT_MODERNMT_KEY = os.environ.get("WEBLATE_MT_MODERNMT_KEY", None) if MT_MODERNMT_KEY: MT_SERVICES += ("weblate.machinery.modernmt.ModernMTTranslation",) # MyMemory identification email, see # http://mymemory.translated.net/doc/spec.php MT_MYMEMORY_EMAIL = os.environ["WEBLATE_ADMIN_EMAIL"] # Optional MyMemory credentials to access private translation memory MT_MYMEMORY_USER = None MT_MYMEMORY_KEY = None if "WEBLATE_MT_MYMEMORY_ENABLED" in os.environ: MT_SERVICES += ("weblate.machinery.mymemory.MyMemoryTranslation",) if "WEBLATE_MT_GLOSBE_ENABLED" in os.environ: MT_SERVICES += ("weblate.machinery.glosbe.GlosbeTranslation",) if "WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED" in os.environ: MT_SERVICES += ( "weblate.machinery.microsoftterminology.MicrosoftTerminologyService", ) # Google API key for Google Translate API MT_GOOGLE_KEY = os.environ.get("WEBLATE_MT_GOOGLE_KEY", None) if MT_GOOGLE_KEY: MT_SERVICES += ("weblate.machinery.google.GoogleTranslation",) # Baidu app key and secret MT_BAIDU_ID = None MT_BAIDU_SECRET = None # Youdao Zhiyun app key and secret MT_YOUDAO_ID = None MT_YOUDAO_SECRET = None # Netease Sight (Jianwai) app key and secret MT_NETEASE_KEY = None MT_NETEASE_SECRET = None # API key for Yandex Translate API MT_YANDEX_KEY = None # tmserver URL MT_TMSERVER = None # SAP Translation Hub MT_SAP_BASE_URL = os.environ.get("WEBLATE_MT_SAP_BASE_URL", None) MT_SAP_SANDBOX_APIKEY = os.environ.get("WEBLATE_MT_SAP_SANDBOX_APIKEY", None) MT_SAP_USERNAME = os.environ.get("WEBLATE_MT_SAP_USERNAME", None) MT_SAP_PASSWORD = os.environ.get("WEBLATE_MT_SAP_PASSWORD", None) MT_SAP_USE_MT = get_env_bool("WEBLATE_MT_SAP_USE_MT", True) if MT_SAP_BASE_URL: MT_SERVICES += ("weblate.machinery.saptranslationhub.SAPTranslationHub",) # Title of site to use SITE_TITLE = os.environ.get("WEBLATE_SITE_TITLE", "Weblate") # Whether site uses https ENABLE_HTTPS = get_env_bool("WEBLATE_ENABLE_HTTPS", False) # Use HTTPS when creating redirect URLs for social authentication, see # documentation for more details: # https://python-social-auth-docs.readthedocs.io/en/latest/configuration/settings.html#processing-redirects-and-urlopen SOCIAL_AUTH_REDIRECT_IS_HTTPS = ENABLE_HTTPS # Make CSRF cookie HttpOnly, see documentation for more details: # https://docs.djangoproject.com/en/1.11/ref/settings/#csrf-cookie-httponly CSRF_COOKIE_HTTPONLY = True CSRF_COOKIE_SECURE = ENABLE_HTTPS # Store CSRF token in session CSRF_USE_SESSIONS = True # Customize CSRF failure view CSRF_FAILURE_VIEW = "weblate.trans.views.error.csrf_failure" SESSION_COOKIE_SECURE = ENABLE_HTTPS SESSION_COOKIE_HTTPONLY = True # SSL redirect SECURE_SSL_REDIRECT = ENABLE_HTTPS # Sent referrrer only for same origin links SECURE_REFERRER_POLICY = "same-origin" # SSL redirect URL exemption list SECURE_REDIRECT_EXEMPT = (r"healthz/$",) # Allowing HTTP access to health check # Session cookie age (in seconds) SESSION_COOKIE_AGE = 1209600 # Increase allowed upload size DATA_UPLOAD_MAX_MEMORY_SIZE = 50000000 # Apply session coookie settings to language cookie as ewll LANGUAGE_COOKIE_SECURE = SESSION_COOKIE_SECURE LANGUAGE_COOKIE_HTTPONLY = SESSION_COOKIE_HTTPONLY LANGUAGE_COOKIE_AGE = SESSION_COOKIE_AGE * 10 # Some security headers SECURE_BROWSER_XSS_FILTER = True X_FRAME_OPTIONS = "DENY" SECURE_CONTENT_TYPE_NOSNIFF = True # Optionally enable HSTS SECURE_HSTS_SECONDS = 31536000 if ENABLE_HTTPS else 0 SECURE_HSTS_PRELOAD = ENABLE_HTTPS SECURE_HSTS_INCLUDE_SUBDOMAINS = ENABLE_HTTPS # HTTPS detection behind reverse proxy WEBLATE_SECURE_PROXY_SSL_HEADER = get_env_list("WEBLATE_SECURE_PROXY_SSL_HEADER") if WEBLATE_SECURE_PROXY_SSL_HEADER: SECURE_PROXY_SSL_HEADER = WEBLATE_SECURE_PROXY_SSL_HEADER # URL of login LOGIN_URL = "{0}/accounts/login/".format(URL_PREFIX) # URL of logout LOGOUT_URL = "{0}/accounts/logout/".format(URL_PREFIX) # Default location for login LOGIN_REDIRECT_URL = "{0}/".format(URL_PREFIX) # Anonymous user name ANONYMOUS_USER_NAME = "anonymous" # Reverse proxy settings IP_PROXY_HEADER = os.environ.get("WEBLATE_IP_PROXY_HEADER", "") IP_BEHIND_REVERSE_PROXY = bool(IP_PROXY_HEADER) IP_PROXY_OFFSET = 0 # Sending HTML in mails EMAIL_SEND_HTML = True # Subject of emails includes site title EMAIL_SUBJECT_PREFIX = "[{0}] ".format(SITE_TITLE) # Enable remote hooks ENABLE_HOOKS = True # By default the length of a given translation is limited to the length of # the source string * 10 characters. Set this option to False to allow longer # translations (up to 10.000 characters) LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH = True # Use simple language codes for default language/country combinations SIMPLIFY_LANGUAGES = get_env_bool("WEBLATE_SIMPLIFY_LANGUAGES", True) # Render forms using bootstrap CRISPY_TEMPLATE_PACK = "bootstrap3" # List of quality checks CHECK_LIST = [ "weblate.checks.same.SameCheck", "weblate.checks.chars.BeginNewlineCheck", "weblate.checks.chars.EndNewlineCheck", "weblate.checks.chars.BeginSpaceCheck", "weblate.checks.chars.EndSpaceCheck", "weblate.checks.chars.DoubleSpaceCheck", "weblate.checks.chars.EndStopCheck", "weblate.checks.chars.EndColonCheck", "weblate.checks.chars.EndQuestionCheck", "weblate.checks.chars.EndExclamationCheck", "weblate.checks.chars.EndEllipsisCheck", "weblate.checks.chars.EndSemicolonCheck", "weblate.checks.chars.MaxLengthCheck", "weblate.checks.chars.KashidaCheck", "weblate.checks.chars.PuctuationSpacingCheck", "weblate.checks.format.PythonFormatCheck", "weblate.checks.format.PythonBraceFormatCheck", "weblate.checks.format.PHPFormatCheck", "weblate.checks.format.CFormatCheck", "weblate.checks.format.PerlFormatCheck", "weblate.checks.format.JavaScriptFormatCheck", "weblate.checks.format.CSharpFormatCheck", "weblate.checks.format.JavaFormatCheck", "weblate.checks.format.JavaMessageFormatCheck", "weblate.checks.format.PercentPlaceholdersCheck", "weblate.checks.format.I18NextInterpolationCheck", "weblate.checks.format.ESTemplateLiteralsCheck", "weblate.checks.angularjs.AngularJSInterpolationCheck", "weblate.checks.qt.QtFormatCheck", "weblate.checks.qt.QtPluralCheck", "weblate.checks.ruby.RubyFormatCheck", "weblate.checks.consistency.PluralsCheck", "weblate.checks.consistency.SamePluralsCheck", "weblate.checks.consistency.ConsistencyCheck", "weblate.checks.consistency.TranslatedCheck", "weblate.checks.chars.EscapedNewlineCountingCheck", "weblate.checks.chars.NewLineCountCheck", "weblate.checks.markup.BBCodeCheck", "weblate.checks.chars.ZeroWidthSpaceCheck", "weblate.checks.render.MaxSizeCheck", "weblate.checks.markup.XMLValidityCheck", "weblate.checks.markup.XMLTagsCheck", "weblate.checks.markup.MarkdownRefLinkCheck", "weblate.checks.markup.MarkdownLinkCheck", "weblate.checks.markup.MarkdownSyntaxCheck", "weblate.checks.markup.URLCheck", "weblate.checks.markup.SafeHTMLCheck", "weblate.checks.placeholders.PlaceholderCheck", "weblate.checks.placeholders.RegexCheck", "weblate.checks.duplicate.DuplicateCheck", "weblate.checks.source.OptionalPluralCheck", "weblate.checks.source.EllipsisCheck", "weblate.checks.source.MultipleFailingCheck", "weblate.checks.source.LongUntranslatedCheck", "weblate.checks.format.MultipleUnnamedFormatsCheck", ] modify_env_list(CHECK_LIST, "CHECK") # List of automatic fixups AUTOFIX_LIST = [ "weblate.trans.autofixes.whitespace.SameBookendingWhitespace", "weblate.trans.autofixes.chars.ReplaceTrailingDotsWithEllipsis", "weblate.trans.autofixes.chars.RemoveZeroSpace", "weblate.trans.autofixes.chars.RemoveControlChars", ] modify_env_list(AUTOFIX_LIST, "AUTOFIX") # List of enabled addons WEBLATE_ADDONS = [ "weblate.addons.gettext.GenerateMoAddon", "weblate.addons.gettext.UpdateLinguasAddon", "weblate.addons.gettext.UpdateConfigureAddon", "weblate.addons.gettext.MsgmergeAddon", "weblate.addons.gettext.GettextCustomizeAddon", "weblate.addons.gettext.GettextAuthorComments", "weblate.addons.cleanup.CleanupAddon", "weblate.addons.consistency.LangaugeConsistencyAddon", "weblate.addons.discovery.DiscoveryAddon", "weblate.addons.flags.SourceEditAddon", "weblate.addons.flags.TargetEditAddon", "weblate.addons.flags.SameEditAddon", "weblate.addons.flags.BulkEditAddon", "weblate.addons.generate.GenerateFileAddon", "weblate.addons.json.JSONCustomizeAddon", "weblate.addons.properties.PropertiesSortAddon", "weblate.addons.git.GitSquashAddon", "weblate.addons.removal.RemoveComments", "weblate.addons.removal.RemoveSuggestions", "weblate.addons.resx.ResxUpdateAddon", "weblate.addons.yaml.YAMLCustomizeAddon", "weblate.addons.autotranslate.AutoTranslateAddon", ] modify_env_list(WEBLATE_ADDONS, "ADDONS") # E-mail address that error messages come from. SERVER_EMAIL = os.environ["WEBLATE_SERVER_EMAIL"] # Default email address to use for various automated correspondence from # the site managers. Used for registration emails. DEFAULT_FROM_EMAIL = os.environ["WEBLATE_DEFAULT_FROM_EMAIL"] # List of URLs your site is supposed to serve ALLOWED_HOSTS = get_env_list("WEBLATE_ALLOWED_HOSTS", ["*"]) # Extract redis password REDIS_PASSWORD = os.environ.get("REDIS_PASSWORD", None) REDIS_PROTO = "rediss" if get_env_bool("REDIS_TLS", False) else "redis" # Configuration for caching CACHES = { "default": { "BACKEND": "django_redis.cache.RedisCache", "LOCATION": "{}://{}:{}/{}".format( REDIS_PROTO, os.environ.get("REDIS_HOST", "cache"), os.environ.get("REDIS_PORT", "6379"), os.environ.get("REDIS_DB", "1"), ), # If redis is running on same host as Weblate, you might # want to use unix sockets instead: # "LOCATION": "unix:///var/run/redis/redis.sock?db=1", "OPTIONS": { "CLIENT_CLASS": "django_redis.client.DefaultClient", "PARSER_CLASS": "redis.connection.HiredisParser", "PASSWORD": REDIS_PASSWORD if REDIS_PASSWORD else None, "CONNECTION_POOL_KWARGS": {}, }, "KEY_PREFIX": "weblate", }, "avatar": { "BACKEND": "django.core.cache.backends.filebased.FileBasedCache", "LOCATION": os.path.join(DATA_DIR, "avatar-cache"), "TIMEOUT": 86400, "OPTIONS": {"MAX_ENTRIES": 1000}, }, } if not get_env_bool("REDIS_VERIFY_SSL", True) and REDIS_PROTO == "rediss": CACHES["default"]["OPTIONS"]["CONNECTION_POOL_KWARGS"]["ssl_cert_reqs"] = None # Store sessions in cache SESSION_ENGINE = "django.contrib.sessions.backends.cache" # Store messages in session MESSAGE_STORAGE = "django.contrib.messages.storage.session.SessionStorage" # REST framework settings for API REST_FRAMEWORK = { # Use Django's standard `django.contrib.auth` permissions, # or allow read-only access for unauthenticated users. "DEFAULT_PERMISSION_CLASSES": [ # Require authentication for login required sites "rest_framework.permissions.IsAuthenticated" if REQUIRE_LOGIN else "rest_framework.permissions.IsAuthenticatedOrReadOnly" ], "DEFAULT_AUTHENTICATION_CLASSES": ( "rest_framework.authentication.TokenAuthentication", "weblate.api.authentication.BearerAuthentication", "rest_framework.authentication.SessionAuthentication", ), "DEFAULT_THROTTLE_CLASSES": ( "weblate.api.throttling.UserRateThrottle", "weblate.api.throttling.AnonRateThrottle", ), "DEFAULT_THROTTLE_RATES": {"anon": "100/day", "user": "5000/hour"}, "DEFAULT_PAGINATION_CLASS": ("rest_framework.pagination.PageNumberPagination"), "PAGE_SIZE": 20, "VIEW_DESCRIPTION_FUNCTION": "weblate.api.views.get_view_description", "UNAUTHENTICATED_USER": "weblate.auth.models.get_anonymous", } # Fonts CDN URL FONTS_CDN_URL = None # Django compressor offline mode COMPRESS_OFFLINE = True COMPRESS_OFFLINE_CONTEXT = [ {"fonts_cdn_url": FONTS_CDN_URL, "STATIC_URL": STATIC_URL, "LANGUAGE_BIDI": True}, {"fonts_cdn_url": FONTS_CDN_URL, "STATIC_URL": STATIC_URL, "LANGUAGE_BIDI": False}, ] # Require login for all URLs if REQUIRE_LOGIN: LOGIN_REQUIRED_URLS = (r"/(.*)$",) # In such case you will want to include some of the exceptions LOGIN_REQUIRED_URLS_EXCEPTIONS = get_env_list( "WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS", ( rf"{URL_PREFIX}/accounts/(.*)$", # Required for login rf"{URL_PREFIX}/admin/login/(.*)$", # Required for admin login rf"{URL_PREFIX}/static/(.*)$", # Required for development mode rf"{URL_PREFIX}/widgets/(.*)$", # Allowing public access to widgets rf"{URL_PREFIX}/data/(.*)$", # Allowing public access to data exports rf"{URL_PREFIX}/hooks/(.*)$", # Allowing public access to notifications rf"{URL_PREFIX}/healthz/$", # Allowing public access to health check rf"{URL_PREFIX}/api/(.*)$", # Allowing access to API rf"{URL_PREFIX}/js/i18n/$", # Javascript localization rf"{URL_PREFIX}/contact/$", # Optional for contact form rf"{URL_PREFIX}/legal/(.*)$", # Optional for legal app ), ) modify_env_list(LOGIN_REQUIRED_URLS_EXCEPTIONS, "LOGIN_REQUIRED_URLS_EXCEPTIONS") # Email server EMAIL_USE_TLS = get_env_bool("WEBLATE_EMAIL_USE_TLS", True) EMAIL_USE_SSL = get_env_bool("WEBLATE_EMAIL_USE_SSL", False) EMAIL_HOST = os.environ.get("WEBLATE_EMAIL_HOST", "localhost") EMAIL_HOST_USER = os.environ.get( "WEBLATE_EMAIL_HOST_USER", os.environ.get("WEBLATE_EMAIL_USER", "") ) EMAIL_HOST_PASSWORD = os.environ.get( "WEBLATE_EMAIL_HOST_PASSWORD", os.environ.get("WEBLATE_EMAIL_PASSWORD", "") ) EMAIL_PORT = int(os.environ.get("WEBLATE_EMAIL_PORT", "25")) EMAIL_BACKEND = os.environ.get( "WEBLATE_EMAIL_BACKEND", "django.core.mail.backends.smtp.EmailBackend" ) # Silence some of the Django system checks SILENCED_SYSTEM_CHECKS = [ # We have modified django.contrib.auth.middleware.AuthenticationMiddleware # as weblate.accounts.middleware.AuthenticationMiddleware "admin.E408" ] SILENCED_SYSTEM_CHECKS.extend(get_env_list("WEBLATE_SILENCED_SYSTEM_CHECKS")) # Celery worker configuration for production CELERY_TASK_ALWAYS_EAGER = get_env_bool("WEBLATE_CELERY_EAGER", False) CELERY_BROKER_URL = "{}://{}{}:{}/{}".format( REDIS_PROTO, ":{}@".format(REDIS_PASSWORD) if REDIS_PASSWORD else "", os.environ.get("REDIS_HOST", "cache"), os.environ.get("REDIS_PORT", "6379"), os.environ.get("REDIS_DB", "1"), ) if REDIS_PROTO == "rediss": CELERY_BROKER_URL = "{}?ssl_cert_reqs={}".format( CELERY_BROKER_URL, "CERT_REQUIRED" if get_env_bool("REDIS_VERIFY_SSL", True) else "CERT_NONE", ) CELERY_RESULT_BACKEND = CELERY_BROKER_URL # Celery settings, it is not recommended to change these CELERY_WORKER_MAX_MEMORY_PER_CHILD = 200000 CELERY_BEAT_SCHEDULE_FILENAME = os.path.join(DATA_DIR, "celery", "beat-schedule") CELERY_TASK_ROUTES = { "weblate.trans.tasks.auto_translate": {"queue": "translate"}, "weblate.accounts.tasks.notify_*": {"queue": "notify"}, "weblate.accounts.tasks.send_mails": {"queue": "notify"}, "weblate.utils.tasks.settings_backup": {"queue": "backup"}, "weblate.utils.tasks.database_backup": {"queue": "backup"}, "weblate.wladmin.tasks.backup": {"queue": "backup"}, "weblate.wladmin.tasks.backup_service": {"queue": "backup"}, } # Database backup type DATABASE_BACKUP = os.environ.get("WEBLATE_DATABASE_BACKUP", "plain") # Enable auto updating AUTO_UPDATE = get_env_bool("WEBLATE_AUTO_UPDATE", False) # Default access control DEFAULT_ACCESS_CONTROL = get_env_int("WEBLATE_DEFAULT_ACCESS_CONTROL", 0) # Default access control DEFAULT_RESTRICTED_COMPONENT = get_env_bool( "WEBLATE_DEFAULT_RESTRICTED_COMPONENT", False ) # Default translation propagation DEFAULT_TRANSLATION_PROPAGATION = get_env_bool( "WEBLATE_DEFAULT_TRANSLATION_PROPAGATION", True ) # PGP commits signing WEBLATE_GPG_IDENTITY = os.environ.get("WEBLATE_GPG_IDENTITY", None) # Third party services integration MATOMO_SITE_ID = os.environ.get("WEBLATE_MATOMO_SITE_ID", None) MATOMO_URL = os.environ.get("WEBLATE_MATOMO_URL", None) GOOGLE_ANALYTICS_ID = os.environ.get("WEBLATE_GOOGLE_ANALYTICS_ID", None) SENTRY_DSN = os.environ.get("SENTRY_DSN", None) SENTRY_ENVIRONMENT = os.environ.get("SENTRY_ENVIRONMENT", None) AKISMET_API_KEY = os.environ.get("WEBLATE_AKISMET_API_KEY", None) ADDITIONAL_CONFIG = "/app/data/settings-override.py" if os.path.exists(ADDITIONAL_CONFIG): with open(ADDITIONAL_CONFIG) as handle: code = compile(handle.read(), ADDITIONAL_CONFIG, "exec") exec(code) ## Impact I didn't try anything with the secret key, and dont know what access it has, i though it would be a good idea to share this finding with you in case it can be used in a way that i dont know. Best Regards

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cleartext Storage of Sensitive Information