feat: initialize project structure with core setup
Initial setup of the ColdBrew Django-based VPN manager project. Added basic project structure including core Django configurations and essential files: - Added `.gitignore` to exclude unnecessary files from version control. - Introduced `LICENSE` with MIT license. - Created basic `README.md` with setup and contribution guidance. - Configured Django project settings with auto-generated secrets. - Implemented essential VPN management models, views, and admin settings. - Integrated core dependencies like Django Rest Framework, Celery for task management, and Redis for caching. - Added Poetry for dependency management along with necessary dependencies for development and database support.
This commit is contained in:
commit
e1bf6b9901
22 changed files with 2151 additions and 0 deletions
6
.gitignore
vendored
Normal file
6
.gitignore
vendored
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
settings.ini
|
||||||
|
*.pyc
|
||||||
|
__pycache__/
|
||||||
|
db.sqlite3
|
||||||
|
.venv/
|
||||||
|
venv/
|
19
LICENSE
Normal file
19
LICENSE
Normal file
|
@ -0,0 +1,19 @@
|
||||||
|
Copyright (c) 2024 Private.coffee Team <support@private.coffee>
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
in the Software without restriction, including without limitation the rights
|
||||||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
copies of the Software, and to permit persons to whom the Software is
|
||||||
|
furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
13
README.md
Normal file
13
README.md
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
# ColdBrew - A Django-based VPN manager.
|
||||||
|
|
||||||
|
## Setup Notes
|
||||||
|
|
||||||
|
1. Ensure that you have a rule in iptables that denies routing by default. ColdBrew will manage the rules for you, but it needs a rule to start from. If you don't have one, you can add one with `iptables -A FORWARD -j DROP`.
|
||||||
|
|
||||||
|
## Contributing
|
||||||
|
|
||||||
|
We welcome contributions to this project. Please see the [CONTRIBUTING](CONTRIBUTING.md) file for more information.
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
|
0
coldbrew/__init__.py
Normal file
0
coldbrew/__init__.py
Normal file
16
coldbrew/asgi.py
Normal file
16
coldbrew/asgi.py
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
"""
|
||||||
|
ASGI config for coldbrew project.
|
||||||
|
|
||||||
|
It exposes the ASGI callable as a module-level variable named ``application``.
|
||||||
|
|
||||||
|
For more information on this file, see
|
||||||
|
https://docs.djangoproject.com/en/5.0/howto/deployment/asgi/
|
||||||
|
"""
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
|
from django.core.asgi import get_asgi_application
|
||||||
|
|
||||||
|
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'coldbrew.settings')
|
||||||
|
|
||||||
|
application = get_asgi_application()
|
130
coldbrew/settings.py
Normal file
130
coldbrew/settings.py
Normal file
|
@ -0,0 +1,130 @@
|
||||||
|
"""
|
||||||
|
Django settings for coldbrew project.
|
||||||
|
|
||||||
|
Generated by 'django-admin startproject' using Django 5.0.6.
|
||||||
|
|
||||||
|
For more information on this file, see
|
||||||
|
https://docs.djangoproject.com/en/5.0/topics/settings/
|
||||||
|
|
||||||
|
For the full list of settings and their values, see
|
||||||
|
https://docs.djangoproject.com/en/5.0/ref/settings/
|
||||||
|
"""
|
||||||
|
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
import os
|
||||||
|
import base64
|
||||||
|
|
||||||
|
from autosecretkey import AutoSecretKey
|
||||||
|
|
||||||
|
# Build paths inside the project like this: BASE_DIR / 'subdir'.
|
||||||
|
BASE_DIR = Path(__file__).resolve().parent.parent
|
||||||
|
|
||||||
|
ASK = AutoSecretKey("settings.ini")
|
||||||
|
SECRET_KEY = ASK.secret_key
|
||||||
|
CONFIG = ASK.config
|
||||||
|
DEBUG = CONFIG.getboolean("ColdBrew", "Debug", fallback=False)
|
||||||
|
|
||||||
|
if not (FIELD_ENCRYPTION_KEY := CONFIG.get("ColdBrew", "EncryptionKey")):
|
||||||
|
FIELD_ENCRYPTION_KEY = base64.urlsafe_b64encode(os.urandom(32))
|
||||||
|
CONFIG["ColdBrew"]["EncryptionKey"] = FIELD_ENCRYPTION_KEY
|
||||||
|
ASK.write()
|
||||||
|
|
||||||
|
ALLOWED_HOSTS = []
|
||||||
|
|
||||||
|
|
||||||
|
# Application definition
|
||||||
|
|
||||||
|
INSTALLED_APPS = [
|
||||||
|
"django.contrib.admin",
|
||||||
|
"django.contrib.auth",
|
||||||
|
"django.contrib.contenttypes",
|
||||||
|
"django.contrib.sessions",
|
||||||
|
"django.contrib.messages",
|
||||||
|
"django.contrib.staticfiles",
|
||||||
|
"encrypted_model_fields",
|
||||||
|
"coldbrew.vpn",
|
||||||
|
]
|
||||||
|
|
||||||
|
MIDDLEWARE = [
|
||||||
|
"django.middleware.security.SecurityMiddleware",
|
||||||
|
"django.contrib.sessions.middleware.SessionMiddleware",
|
||||||
|
"django.middleware.common.CommonMiddleware",
|
||||||
|
"django.middleware.csrf.CsrfViewMiddleware",
|
||||||
|
"django.contrib.auth.middleware.AuthenticationMiddleware",
|
||||||
|
"django.contrib.messages.middleware.MessageMiddleware",
|
||||||
|
"django.middleware.clickjacking.XFrameOptionsMiddleware",
|
||||||
|
]
|
||||||
|
|
||||||
|
ROOT_URLCONF = "coldbrew.urls"
|
||||||
|
|
||||||
|
TEMPLATES = [
|
||||||
|
{
|
||||||
|
"BACKEND": "django.template.backends.django.DjangoTemplates",
|
||||||
|
"DIRS": [],
|
||||||
|
"APP_DIRS": True,
|
||||||
|
"OPTIONS": {
|
||||||
|
"context_processors": [
|
||||||
|
"django.template.context_processors.debug",
|
||||||
|
"django.template.context_processors.request",
|
||||||
|
"django.contrib.auth.context_processors.auth",
|
||||||
|
"django.contrib.messages.context_processors.messages",
|
||||||
|
],
|
||||||
|
},
|
||||||
|
},
|
||||||
|
]
|
||||||
|
|
||||||
|
WSGI_APPLICATION = "coldbrew.wsgi.application"
|
||||||
|
|
||||||
|
|
||||||
|
# Database
|
||||||
|
# https://docs.djangoproject.com/en/5.0/ref/settings/#databases
|
||||||
|
|
||||||
|
DATABASES = {
|
||||||
|
"default": {
|
||||||
|
"ENGINE": "django.db.backends.sqlite3",
|
||||||
|
"NAME": BASE_DIR / "db.sqlite3",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Password validation
|
||||||
|
# https://docs.djangoproject.com/en/5.0/ref/settings/#auth-password-validators
|
||||||
|
|
||||||
|
AUTH_PASSWORD_VALIDATORS = [
|
||||||
|
{
|
||||||
|
"NAME": "django.contrib.auth.password_validation.UserAttributeSimilarityValidator",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"NAME": "django.contrib.auth.password_validation.MinimumLengthValidator",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator",
|
||||||
|
},
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
# Internationalization
|
||||||
|
# https://docs.djangoproject.com/en/5.0/topics/i18n/
|
||||||
|
|
||||||
|
LANGUAGE_CODE = "en-us"
|
||||||
|
|
||||||
|
TIME_ZONE = "UTC"
|
||||||
|
|
||||||
|
USE_I18N = True
|
||||||
|
|
||||||
|
USE_TZ = True
|
||||||
|
|
||||||
|
|
||||||
|
# Static files (CSS, JavaScript, Images)
|
||||||
|
# https://docs.djangoproject.com/en/5.0/howto/static-files/
|
||||||
|
|
||||||
|
STATIC_URL = "static/"
|
||||||
|
|
||||||
|
# Default primary key field type
|
||||||
|
# https://docs.djangoproject.com/en/5.0/ref/settings/#default-auto-field
|
||||||
|
|
||||||
|
DEFAULT_AUTO_FIELD = "django.db.models.BigAutoField"
|
22
coldbrew/urls.py
Normal file
22
coldbrew/urls.py
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
"""
|
||||||
|
URL configuration for coldbrew project.
|
||||||
|
|
||||||
|
The `urlpatterns` list routes URLs to views. For more information please see:
|
||||||
|
https://docs.djangoproject.com/en/5.0/topics/http/urls/
|
||||||
|
Examples:
|
||||||
|
Function views
|
||||||
|
1. Add an import: from my_app import views
|
||||||
|
2. Add a URL to urlpatterns: path('', views.home, name='home')
|
||||||
|
Class-based views
|
||||||
|
1. Add an import: from other_app.views import Home
|
||||||
|
2. Add a URL to urlpatterns: path('', Home.as_view(), name='home')
|
||||||
|
Including another URLconf
|
||||||
|
1. Import the include() function: from django.urls import include, path
|
||||||
|
2. Add a URL to urlpatterns: path('blog/', include('blog.urls'))
|
||||||
|
"""
|
||||||
|
from django.contrib import admin
|
||||||
|
from django.urls import path
|
||||||
|
|
||||||
|
urlpatterns = [
|
||||||
|
path('admin/', admin.site.urls),
|
||||||
|
]
|
0
coldbrew/vpn/__init__.py
Normal file
0
coldbrew/vpn/__init__.py
Normal file
3
coldbrew/vpn/admin.py
Normal file
3
coldbrew/vpn/admin.py
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
from django.contrib import admin
|
||||||
|
|
||||||
|
# Register your models here.
|
6
coldbrew/vpn/apps.py
Normal file
6
coldbrew/vpn/apps.py
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
from django.apps import AppConfig
|
||||||
|
|
||||||
|
|
||||||
|
class VpnConfig(AppConfig):
|
||||||
|
default_auto_field = "django.db.models.BigAutoField"
|
||||||
|
name = "coldbrew.vpn"
|
26
coldbrew/vpn/fields.py
Normal file
26
coldbrew/vpn/fields.py
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
from django.db import models
|
||||||
|
import ipaddress
|
||||||
|
|
||||||
|
class SubnetField(models.CharField):
|
||||||
|
description = "A field to store IPv4 or IPv6 subnets"
|
||||||
|
|
||||||
|
def __init__(self, *args, **kwargs):
|
||||||
|
kwargs['max_length'] = 43 # Maximum length for IPv6 with subnet
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
|
||||||
|
def from_db_value(self, value, expression, connection):
|
||||||
|
if value is None:
|
||||||
|
return value
|
||||||
|
return ipaddress.ip_network(value)
|
||||||
|
|
||||||
|
def to_python(self, value):
|
||||||
|
if value is None:
|
||||||
|
return value
|
||||||
|
if isinstance(value, ipaddress._BaseNetwork):
|
||||||
|
return value
|
||||||
|
return ipaddress.ip_network(value)
|
||||||
|
|
||||||
|
def get_prep_value(self, value):
|
||||||
|
if value is None:
|
||||||
|
return value
|
||||||
|
return str(value)
|
60
coldbrew/vpn/helpers.py
Normal file
60
coldbrew/vpn/helpers.py
Normal file
|
@ -0,0 +1,60 @@
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
|
||||||
|
def generate_private_key() -> str:
|
||||||
|
"""Returns a new WireGuard private key
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The private key
|
||||||
|
"""
|
||||||
|
return subprocess.run(["wg", "genkey"], capture_output=True).stdout.decode().strip()
|
||||||
|
|
||||||
|
|
||||||
|
def get_public_key(private_key: str) -> str:
|
||||||
|
"""Returns the public key for a WireGuard private key
|
||||||
|
|
||||||
|
Args:
|
||||||
|
private_key (str): The private key
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The public key
|
||||||
|
"""
|
||||||
|
return subprocess.run(
|
||||||
|
["wg", "pubkey"], capture_output=True, input=private_key, text=True
|
||||||
|
).stdout.strip()
|
||||||
|
|
||||||
|
|
||||||
|
def generate_preshared_key() -> str:
|
||||||
|
"""Returns a new WireGuard preshared key
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The preshared key
|
||||||
|
"""
|
||||||
|
return subprocess.run(["wg", "genpsk"], capture_output=True).stdout.decode().strip()
|
||||||
|
|
||||||
|
|
||||||
|
def run_command(command):
|
||||||
|
"""Run a shell command and return the output
|
||||||
|
|
||||||
|
Args:
|
||||||
|
command (str): The command to run
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The output of the command
|
||||||
|
"""
|
||||||
|
result = subprocess.run(command, shell=True, capture_output=True, text=True)
|
||||||
|
if result.returncode != 0:
|
||||||
|
raise Exception(f"Command failed: {command}\n{result.stderr}")
|
||||||
|
return result.stdout.strip()
|
||||||
|
|
||||||
|
|
||||||
|
def get_interface_name(vpn):
|
||||||
|
"""Return the WireGuard interface name for a VPN
|
||||||
|
|
||||||
|
Args:
|
||||||
|
vpn (VPN): The VPN object
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The interface name
|
||||||
|
"""
|
||||||
|
return f"wg-{vpn.id}"
|
0
coldbrew/vpn/migrations/__init__.py
Normal file
0
coldbrew/vpn/migrations/__init__.py
Normal file
43
coldbrew/vpn/models.py
Normal file
43
coldbrew/vpn/models.py
Normal file
|
@ -0,0 +1,43 @@
|
||||||
|
from django.db import models
|
||||||
|
from django.contrib.auth import get_user_model
|
||||||
|
|
||||||
|
from uuid import uuid4
|
||||||
|
|
||||||
|
import random
|
||||||
|
|
||||||
|
from encrypted_model_fields.fields import EncryptedCharField
|
||||||
|
|
||||||
|
from .fields import SubnetField
|
||||||
|
from .helpers import generate_private_key, get_public_key
|
||||||
|
|
||||||
|
|
||||||
|
class VPN(models.Model):
|
||||||
|
id = models.UUIDField(default=uuid4, primary_key=True)
|
||||||
|
owner = models.ForeignKey(get_user_model(), models.CASCADE)
|
||||||
|
name = models.CharField(max_length=128)
|
||||||
|
port = models.IntegerField(
|
||||||
|
unique=True, min_value=10000, max_value=40000, null=True, blank=True
|
||||||
|
)
|
||||||
|
private_key = EncryptedCharField(max_length=128, null=True, blank=True)
|
||||||
|
public_key = models.CharField(max_length=128, null=True, blank=True)
|
||||||
|
ipv4_subnet = SubnetField(unique=True)
|
||||||
|
ipv6_subnet = SubnetField(unique=True)
|
||||||
|
|
||||||
|
def save(self, *args, **kwargs):
|
||||||
|
if not self.private_key:
|
||||||
|
self.private_key = generate_private_key()
|
||||||
|
|
||||||
|
self.public_key = get_public_key(self.private_key)
|
||||||
|
|
||||||
|
if not self.port:
|
||||||
|
self.port = random.randint(10000, 40000)
|
||||||
|
|
||||||
|
super().save(*args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
class Device(models.Model):
|
||||||
|
id = models.UUIDField(default=uuid4, primary_key=True)
|
||||||
|
vpn = models.ForeignKey(VPN, models.CASCADE)
|
||||||
|
name = models.CharField(max_length=128)
|
||||||
|
public_key = models.CharField(max_length=128)
|
||||||
|
preshared_key = EncryptedCharField(max_length=128)
|
3
coldbrew/vpn/tests.py
Normal file
3
coldbrew/vpn/tests.py
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
from django.test import TestCase
|
||||||
|
|
||||||
|
# Create your tests here.
|
3
coldbrew/vpn/views.py
Normal file
3
coldbrew/vpn/views.py
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
from django.shortcuts import render
|
||||||
|
|
||||||
|
# Create your views here.
|
43
coldbrew/vpn/vpn_config.py
Normal file
43
coldbrew/vpn/vpn_config.py
Normal file
|
@ -0,0 +1,43 @@
|
||||||
|
from .helpers import run_command, get_interface_name
|
||||||
|
|
||||||
|
|
||||||
|
def configure_interface(vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
|
||||||
|
# Create and configure the interface
|
||||||
|
run_command(f"ip link add dev {interface_name} type wireguard")
|
||||||
|
run_command(f"ip address add {vpn.ipv4_subnet} dev {interface_name}")
|
||||||
|
run_command(f"ip address add {vpn.ipv6_subnet} dev {interface_name}")
|
||||||
|
run_command(
|
||||||
|
f"wg set {interface_name} listen-port {vpn.port} private-key <(echo {vpn.private_key})"
|
||||||
|
)
|
||||||
|
run_command(f"ip link set up dev {interface_name}")
|
||||||
|
|
||||||
|
|
||||||
|
def update_interface(vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
|
||||||
|
# Update the interface configuration
|
||||||
|
run_command(f"ip address flush dev {interface_name}")
|
||||||
|
run_command(f"ip address add {vpn.ipv4_subnet} dev {interface_name}")
|
||||||
|
run_command(f"ip address add {vpn.ipv6_subnet} dev {interface_name}")
|
||||||
|
run_command(
|
||||||
|
f"wg set {interface_name} listen-port {vpn.port} private-key <(echo {vpn.private_key})"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def delete_interface(vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
run_command(f"ip link delete dev {interface_name}")
|
||||||
|
|
||||||
|
|
||||||
|
def add_peer(vpn, device):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
run_command(
|
||||||
|
f"wg set {interface_name} peer {device.public_key} preshared-key <(echo {device.preshared_key}) allowed-ips {device.allowed_ips}"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def remove_peer(vpn, device):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
run_command(f"wg set {interface_name} peer {device.public_key} remove")
|
54
coldbrew/vpn/vpn_firewall.py
Normal file
54
coldbrew/vpn/vpn_firewall.py
Normal file
|
@ -0,0 +1,54 @@
|
||||||
|
from .helpers import run_command, get_interface_name
|
||||||
|
|
||||||
|
|
||||||
|
def delete_interface_rules(interface_name):
|
||||||
|
# List existing IPv4 rules and delete those involving the interface
|
||||||
|
rules = run_command("iptables -S FORWARD").splitlines()
|
||||||
|
for rule in rules:
|
||||||
|
if interface_name in rule:
|
||||||
|
run_command(f"iptables {rule.replace('-A', '-D')}")
|
||||||
|
|
||||||
|
# List existing IPv6 rules and delete those involving the interface
|
||||||
|
rules = run_command("ip6tables -S FORWARD").splitlines()
|
||||||
|
for rule in rules:
|
||||||
|
if interface_name in rule:
|
||||||
|
run_command(f"ip6tables {rule.replace('-A', '-D')}")
|
||||||
|
|
||||||
|
|
||||||
|
def setup_firewall(vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
|
||||||
|
# Remove any existing rules for this VPN interface
|
||||||
|
delete_interface_rules(interface_name)
|
||||||
|
|
||||||
|
# Allow forwarding only within the VPN's own subnets
|
||||||
|
run_command(
|
||||||
|
f"iptables -A FORWARD -i {interface_name} -s {vpn.ipv4_subnet} -d {vpn.ipv4_subnet} -j ACCEPT"
|
||||||
|
)
|
||||||
|
run_command(
|
||||||
|
f"ip6tables -A FORWARD -i {interface_name} -s {vpn.ipv6_subnet} -d {vpn.ipv6_subnet} -j ACCEPT"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def add_firewall_rule(vpn, target_vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
|
||||||
|
# Allow forwarding from vpn to target_vpn
|
||||||
|
run_command(
|
||||||
|
f"iptables -A FORWARD -i {interface_name} -s {vpn.ipv4_subnet} -d {target_vpn.ipv4_subnet} -j ACCEPT"
|
||||||
|
)
|
||||||
|
run_command(
|
||||||
|
f"ip6tables -A FORWARD -i {interface_name} -s {vpn.ipv6_subnet} -d {target_vpn.ipv6_subnet} -j ACCEPT"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def remove_firewall_rule(vpn, target_vpn):
|
||||||
|
interface_name = get_interface_name(vpn)
|
||||||
|
|
||||||
|
# Remove forwarding rule from vpn to target_vpn
|
||||||
|
run_command(
|
||||||
|
f"iptables -D FORWARD -i {interface_name} -s {vpn.ipv4_subnet} -d {target_vpn.ipv4_subnet} -j ACCEPT || true"
|
||||||
|
)
|
||||||
|
run_command(
|
||||||
|
f"ip6tables -D FORWARD -i {interface_name} -s {vpn.ipv6_subnet} -d {target_vpn.ipv6_subnet} -j ACCEPT || true"
|
||||||
|
)
|
16
coldbrew/wsgi.py
Normal file
16
coldbrew/wsgi.py
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
"""
|
||||||
|
WSGI config for coldbrew project.
|
||||||
|
|
||||||
|
It exposes the WSGI callable as a module-level variable named ``application``.
|
||||||
|
|
||||||
|
For more information on this file, see
|
||||||
|
https://docs.djangoproject.com/en/5.0/howto/deployment/wsgi/
|
||||||
|
"""
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
|
from django.core.wsgi import get_wsgi_application
|
||||||
|
|
||||||
|
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'coldbrew.settings')
|
||||||
|
|
||||||
|
application = get_wsgi_application()
|
22
manage.py
Executable file
22
manage.py
Executable file
|
@ -0,0 +1,22 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
"""Django's command-line utility for administrative tasks."""
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
"""Run administrative tasks."""
|
||||||
|
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'coldbrew.settings')
|
||||||
|
try:
|
||||||
|
from django.core.management import execute_from_command_line
|
||||||
|
except ImportError as exc:
|
||||||
|
raise ImportError(
|
||||||
|
"Couldn't import Django. Are you sure it's installed and "
|
||||||
|
"available on your PYTHONPATH environment variable? Did you "
|
||||||
|
"forget to activate a virtual environment?"
|
||||||
|
) from exc
|
||||||
|
execute_from_command_line(sys.argv)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
1613
poetry.lock
generated
Normal file
1613
poetry.lock
generated
Normal file
File diff suppressed because it is too large
Load diff
53
pyproject.toml
Normal file
53
pyproject.toml
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
[tool.poetry]
|
||||||
|
name = "coldbrew"
|
||||||
|
version = "0.0.1"
|
||||||
|
description = ""
|
||||||
|
authors = ["Private.coffee Team <support@private.coffee>"]
|
||||||
|
license = "MIT"
|
||||||
|
readme = "README.md"
|
||||||
|
homepage = "https://private.coffee"
|
||||||
|
repository = "https://git.private.coffee/PrivateCoffee/coldbrew"
|
||||||
|
|
||||||
|
[tool.poetry.dependencies]
|
||||||
|
python = "^3.10"
|
||||||
|
django = "^5.0"
|
||||||
|
djangorestframework = "*"
|
||||||
|
django-storages = "*"
|
||||||
|
django-polymorphic = "*"
|
||||||
|
setuptools = "*"
|
||||||
|
pillow = "*"
|
||||||
|
pygments = "*"
|
||||||
|
markdown = "*"
|
||||||
|
coreapi = "*"
|
||||||
|
pyyaml = "*"
|
||||||
|
django-autosecretkey = "*"
|
||||||
|
celery = "*"
|
||||||
|
redis = "*"
|
||||||
|
django-celery-results = "*"
|
||||||
|
django-celery-beat = "*"
|
||||||
|
drf-spectacular = {extras = ["sidecar"], version = "*"}
|
||||||
|
boto3 = "*"
|
||||||
|
argon2-cffi = "*"
|
||||||
|
django-csp = "*"
|
||||||
|
django-rest-polymorphic = "*"
|
||||||
|
django-crispy-forms = "*"
|
||||||
|
crispy-bootstrap5 = "*"
|
||||||
|
django-encrypted-model-fields = "*"
|
||||||
|
|
||||||
|
[tool.poetry.group.mysql.dependencies]
|
||||||
|
mysqlclient = "*"
|
||||||
|
|
||||||
|
[tool.poetry.group.postgres.dependencies]
|
||||||
|
psycopg2 = "*"
|
||||||
|
|
||||||
|
[tool.poetry.dev-dependencies]
|
||||||
|
pytest = "^5.2"
|
||||||
|
ruff = "*"
|
||||||
|
black = "*"
|
||||||
|
|
||||||
|
[tool.poetry.scripts]
|
||||||
|
quackscape-manage = "quackscape.manage:main"
|
||||||
|
|
||||||
|
[build-system]
|
||||||
|
requires = ["poetry-core>=1.0.0"]
|
||||||
|
build-backend = "poetry.core.masonry.api"
|
Loading…
Reference in a new issue