1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
Files
peeringdb-peeringdb/mainsite/urls.py
Matt Griswold 677f94f550 Support 202111 (#1101)
* Block registering private ASN ranges

* Add a continental region field for facilities #1007

* Incorrect order of search results #232

* Allow users to upload a small logo to their record #346

* Sponsor badge CSS and text translation issues #453

* IXP and Facility summary #18

* Add sales email and phone contact to ix object #949

* Increase timeout timer for IX-F JSON importer to 30s #962

* IX-F manually triggered import bugs #1054

* remove survey notifications

* IX-F importer: manual add followed by IX-F prompted add can result in "The server rejected your data" #807

* performance fix for net view

* api documentation generate broken #956

* fix poc set missing from net view

* Auto focus cursor on search field on main website #695

* PeeringDB website has a poor choice of line-breaks for IPv6 addresses. #748

* Delete childless org objects #838

* linting

* poetry lock

* re-add mistakingly dropped translation to email template

* fix template variables

* regen docs

* regen api docs

* add u2f api

* fix merge cruft

* fido u2f webauthn first steps

* dont need this

* typo

* first ux steps for security key management, u2f views

* u2f auth

* linting

* Cascade delete when performed by superuser in django-admin #735

* security key passwordless login

* reset webauthn migrations

* security key 2fa

* linting

* ux cleanup

* cleanup

* Add IXP to AS record / dropdown limited #469

* ignore orgs that have pre-dated or finished sponsorships attached

* split out to django_security_keys

* default to 90 days

* make URL required for new objects #374

* move CONN_MAX_AGE to proper location and expose as env var (#1060)

* Error message for invalid password on email change

* Registering a new facility or exchange organization is broken #1062

* Creating a facility that matches the name of a soft-deleted facility will cause the entry to bypass the verification queue #901

* irr source validator doesn't allow for hyphens in source #921

* split out javascript

* split out js

* Clicking "Add" to add a user api-key without providing a name for the key raises Internal Error #1033

* remove security key admin views

* global stats don't show up at login screen #284

* Possible for "pending" exchange to have "deleted" ixlan (#1077)

* webauthn finalizations

* oidc support for oauth provider #1070

* Revert "Merge branch 'gh_1070' into 'support_202111'"

* remove unused dev mounts

* linting

* add django-security-key and relock poetry

* re-add imports removed through linting

* docs regen

* oauth toolkit pinned to 1.6.1
django-security-keys pinned to 1.0.1

* remove debug message

* linting

* linting

Co-authored-by: Stefan Pratter <stefan@20c.com>
Co-authored-by: David Poarch <dpoarch@20c.com>
2022-01-11 08:56:47 -06:00

70 lines
2.1 KiB
Python

from django.conf import settings
from django.conf.urls import include, url
from django.conf.urls.static import static
# auto admin
from django.contrib import admin
from django.views.generic.base import RedirectView
from two_factor.urls import urlpatterns as tf_urls
from peeringdb_server.views import LoginView, TwoFactorDisableView
admin.autodiscover()
import allauth.account.views
import peeringdb_server.urls
from peeringdb_server.autocomplete_views import GrappelliHandlerefAutocomplete
tf_urls[0][0] = url(
regex=r"^account/login/$",
view=LoginView.as_view(),
name="login",
)
tf_urls[0][-1] = url(
regex=r"^account/disable-2fa/$",
view=TwoFactorDisableView.as_view(),
name="disable",
)
urlpatterns = [
# override grappelli autocomplete handler
url(
r"^grappelli/lookup/autocomplete/$",
GrappelliHandlerefAutocomplete.as_view(),
name="grp_autocomplete_lookup",
),
# grappelli admin interface improvements
url(r"^grappelli/", include("grappelli.urls")),
# FIXME: adapt to DAL3 changes
# url(r'^autocomplete/', include('dal.urls')),
# FIXME: can remove this if we upgrade to allauth > 0.24.2, upgrade
# has been held off at this point because it requires migrations
url(
r"^accounts/confirm-email/(?P<key>[-:\w]+)/$",
allauth.account.views.confirm_email,
name="account_confirm_email",
),
url(r"^accounts/", include("allauth.urls")),
url(
r"^cp/peeringdb_server/organizationmerge/add/",
RedirectView.as_view(
url="/cp/peeringdb_server/organization/org-merge-tool", permanent=False
),
),
url(r"^cp/", admin.site.urls),
url(r"", include(tf_urls)),
]
urlpatterns += static(settings.STATIC_URL, document_root=settings.STATIC_ROOT)
urlpatterns += static(settings.MEDIA_URL, document_root=settings.MEDIA_ROOT)
urlpatterns += [
url(r"^captcha/", include("captcha.urls")),
]
urlpatterns += peeringdb_server.urls.urlpatterns
handler_404 = "peeringdb_server.views.view_http_error_404"
handler_403 = "peeringdb_server.views.view_http_error_403"