The implementation here is meant to wrap a library of JSON policy documents. Policies should be added to directories corresponding to where they will be defined (portfolio, application, environment). Functionality for parsing portfolio policy definitions is included. When the policies need to be defined on a management group, the AzureCloudProvider can iterate the appropriate tier of the policy manager and add those definitions.
49 lines
1.0 KiB
INI
49 lines
1.0 KiB
INI
[default]
|
|
ASSETS_URL
|
|
AZURE_ACCOUNT_NAME
|
|
AZURE_STORAGE_KEY
|
|
AZURE_TO_BUCKET_NAME
|
|
AZURE_POLICY_LOCATION=policies
|
|
BLOB_STORAGE_URL=http://localhost:8000/
|
|
CAC_URL = http://localhost:8000/login-redirect
|
|
CA_CHAIN = ssl/server-certs/ca-chain.pem
|
|
CDN_ORIGIN=http://localhost:8000
|
|
CELERY_DEFAULT_QUEUE=celery
|
|
CONTRACT_END_DATE = 2022-09-14
|
|
CONTRACT_START_DATE = 2019-09-14
|
|
CRL_FAIL_OPEN = false
|
|
CRL_STORAGE_CONTAINER = crls
|
|
CSP=mock
|
|
DEBUG = true
|
|
DISABLE_CRL_CHECK = false
|
|
ENVIRONMENT = dev
|
|
LIMIT_CONCURRENT_SESSIONS = false
|
|
LOG_JSON = false
|
|
MAIL_PASSWORD
|
|
MAIL_PORT
|
|
MAIL_SENDER
|
|
MAIL_SERVER
|
|
MAIL_TLS
|
|
PERMANENT_SESSION_LIFETIME = 1800
|
|
PGDATABASE = atat
|
|
PGHOST = localhost
|
|
PGPASSWORD = postgres
|
|
PGPORT = 5432
|
|
PGSSLMODE = prefer
|
|
PGSSLROOTCERT
|
|
PGUSER = postgres
|
|
PORT=8000
|
|
REDIS_HOST=localhost:6379
|
|
REDIS_PASSWORD
|
|
REDIS_TLS=False
|
|
REDIS_USER
|
|
SECRET_KEY = change_me_into_something_secret
|
|
SERVER_NAME
|
|
SESSION_COOKIE_NAME=atat
|
|
SESSION_TYPE = redis
|
|
SESSION_USE_SIGNER = True
|
|
SQLALCHEMY_ECHO = False
|
|
STATIC_URL=/static/
|
|
USE_AUDIT_LOG = false
|
|
WTF_CSRF_ENABLED = true
|