mirror of
https://github.com/zulip/zulip.git
synced 2025-11-03 13:33:24 +00:00
settings: Support arbitrary database user and dbname.
This adds basic support for `postgresql.database_user` and `postgresql.database_name` settings in `zulip.conf`; the defaults if unspecified are left as `zulip`. Co-authored-by: Adam Birds <adam.birds@adbwebdesigns.co.uk>
This commit is contained in:
committed by
Tim Abbott
parent
02fc0d3e1d
commit
54c222d3f8
@@ -7,6 +7,7 @@ from typing import Dict, List
|
||||
BASE_DIR = os.path.dirname(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
||||
sys.path.append(BASE_DIR)
|
||||
from scripts.lib.setup_path import setup_path
|
||||
from scripts.lib.zulip_tools import get_config, get_config_file
|
||||
|
||||
setup_path()
|
||||
|
||||
@@ -101,6 +102,13 @@ def generate_secrets(development: bool = False) -> None:
|
||||
if development and need_secret("local_database_password"):
|
||||
add_secret("local_database_password", random_token())
|
||||
|
||||
# We only need a secret if the database username does not match
|
||||
# the OS username, as identd auth works in that case.
|
||||
if get_config(
|
||||
get_config_file(), "postgresql", "database_user", "zulip"
|
||||
) != "zulip" and need_secret("postgres_password"):
|
||||
add_secret("postgres_password", random_token())
|
||||
|
||||
# The core Django SECRET_KEY setting, used by Django internally to
|
||||
# secure sessions. If this gets changed, all users will be logged out.
|
||||
if need_secret("secret_key"):
|
||||
|
||||
Reference in New Issue
Block a user