mirror of
https://github.com/peeringdb/peeringdb.git
synced 2024-05-11 05:55:09 +00:00
* Block registering private ASN ranges * Add a continental region field for facilities #1007 * Incorrect order of search results #232 * Allow users to upload a small logo to their record #346 * Sponsor badge CSS and text translation issues #453 * IXP and Facility summary #18 * Add sales email and phone contact to ix object #949 * Increase timeout timer for IX-F JSON importer to 30s #962 * IX-F manually triggered import bugs #1054 * remove survey notifications * IX-F importer: manual add followed by IX-F prompted add can result in "The server rejected your data" #807 * performance fix for net view * api documentation generate broken #956 * fix poc set missing from net view * Auto focus cursor on search field on main website #695 * PeeringDB website has a poor choice of line-breaks for IPv6 addresses. #748 * Delete childless org objects #838 * linting * poetry lock * re-add mistakingly dropped translation to email template * fix template variables * regen docs * regen api docs * add u2f api * fix merge cruft * fido u2f webauthn first steps * dont need this * typo * first ux steps for security key management, u2f views * u2f auth * linting * Cascade delete when performed by superuser in django-admin #735 * security key passwordless login * reset webauthn migrations * security key 2fa * linting * ux cleanup * cleanup * Add IXP to AS record / dropdown limited #469 * ignore orgs that have pre-dated or finished sponsorships attached * split out to django_security_keys * default to 90 days * make URL required for new objects #374 * move CONN_MAX_AGE to proper location and expose as env var (#1060) * Error message for invalid password on email change * Registering a new facility or exchange organization is broken #1062 * Creating a facility that matches the name of a soft-deleted facility will cause the entry to bypass the verification queue #901 * irr source validator doesn't allow for hyphens in source #921 * split out javascript * split out js * Clicking "Add" to add a user api-key without providing a name for the key raises Internal Error #1033 * remove security key admin views * global stats don't show up at login screen #284 * Possible for "pending" exchange to have "deleted" ixlan (#1077) * webauthn finalizations * oidc support for oauth provider #1070 * Revert "Merge branch 'gh_1070' into 'support_202111'" * remove unused dev mounts * linting * add django-security-key and relock poetry * re-add imports removed through linting * docs regen * oauth toolkit pinned to 1.6.1 django-security-keys pinned to 1.0.1 * remove debug message * linting * linting Co-authored-by: Stefan Pratter <stefan@20c.com> Co-authored-by: David Poarch <dpoarch@20c.com>
70 lines
2.1 KiB
Python
70 lines
2.1 KiB
Python
from django.conf import settings
|
|
from django.conf.urls import include, url
|
|
from django.conf.urls.static import static
|
|
|
|
# auto admin
|
|
from django.contrib import admin
|
|
from django.views.generic.base import RedirectView
|
|
from two_factor.urls import urlpatterns as tf_urls
|
|
|
|
from peeringdb_server.views import LoginView, TwoFactorDisableView
|
|
|
|
admin.autodiscover()
|
|
|
|
import allauth.account.views
|
|
|
|
import peeringdb_server.urls
|
|
from peeringdb_server.autocomplete_views import GrappelliHandlerefAutocomplete
|
|
|
|
tf_urls[0][0] = url(
|
|
regex=r"^account/login/$",
|
|
view=LoginView.as_view(),
|
|
name="login",
|
|
)
|
|
|
|
tf_urls[0][-1] = url(
|
|
regex=r"^account/disable-2fa/$",
|
|
view=TwoFactorDisableView.as_view(),
|
|
name="disable",
|
|
)
|
|
|
|
urlpatterns = [
|
|
# override grappelli autocomplete handler
|
|
url(
|
|
r"^grappelli/lookup/autocomplete/$",
|
|
GrappelliHandlerefAutocomplete.as_view(),
|
|
name="grp_autocomplete_lookup",
|
|
),
|
|
# grappelli admin interface improvements
|
|
url(r"^grappelli/", include("grappelli.urls")),
|
|
# FIXME: adapt to DAL3 changes
|
|
# url(r'^autocomplete/', include('dal.urls')),
|
|
# FIXME: can remove this if we upgrade to allauth > 0.24.2, upgrade
|
|
# has been held off at this point because it requires migrations
|
|
url(
|
|
r"^accounts/confirm-email/(?P<key>[-:\w]+)/$",
|
|
allauth.account.views.confirm_email,
|
|
name="account_confirm_email",
|
|
),
|
|
url(r"^accounts/", include("allauth.urls")),
|
|
url(
|
|
r"^cp/peeringdb_server/organizationmerge/add/",
|
|
RedirectView.as_view(
|
|
url="/cp/peeringdb_server/organization/org-merge-tool", permanent=False
|
|
),
|
|
),
|
|
url(r"^cp/", admin.site.urls),
|
|
url(r"", include(tf_urls)),
|
|
]
|
|
urlpatterns += static(settings.STATIC_URL, document_root=settings.STATIC_ROOT)
|
|
urlpatterns += static(settings.MEDIA_URL, document_root=settings.MEDIA_ROOT)
|
|
|
|
urlpatterns += [
|
|
url(r"^captcha/", include("captcha.urls")),
|
|
]
|
|
|
|
urlpatterns += peeringdb_server.urls.urlpatterns
|
|
|
|
handler_404 = "peeringdb_server.views.view_http_error_404"
|
|
handler_403 = "peeringdb_server.views.view_http_error_403"
|