Skip to content

Commit b8b1c8f

Browse files
committed
Rename conversion lambdas
1 parent 41ff541 commit b8b1c8f

File tree

1 file changed

+28
-28
lines changed

1 file changed

+28
-28
lines changed

configuration/configuration.py

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
4242

4343
return map_fn(env_value)
4444

45-
_EQUALS_TRUE = lambda value : value.lower() == 'true'
45+
_AS_BOOL = lambda value : value.lower() == 'true'
4646
_AS_INT = lambda value : int(value)
47-
_SPLIT_ON_SPACE = lambda value : list(filter(None, value.split(' ')))
47+
_AS_LIST = lambda value : list(filter(None, value.split(' ')))
4848

4949
_BASE_DIR = dirname(dirname(abspath(__file__)))
5050

@@ -73,7 +73,7 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
7373
# Database connection SSLMODE
7474
'CONN_MAX_AGE': _environ_get_and_map('DB_CONN_MAX_AGE', '300', _AS_INT),
7575
# Max database connection age
76-
'DISABLE_SERVER_SIDE_CURSORS': _environ_get_and_map('DB_DISABLE_SERVER_SIDE_CURSORS', 'False', _EQUALS_TRUE),
76+
'DISABLE_SERVER_SIDE_CURSORS': _environ_get_and_map('DB_DISABLE_SERVER_SIDE_CURSORS', 'False', _AS_BOOL),
7777
# Disable the use of server-side cursors transaction pooling
7878
}
7979

@@ -86,16 +86,16 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
8686
'PORT': _environ_get_and_map('REDIS_PORT', 6379, _AS_INT),
8787
'PASSWORD': _read_secret('redis_password', environ.get('REDIS_PASSWORD', '')),
8888
'DATABASE': _environ_get_and_map('REDIS_DATABASE', 0, _AS_INT),
89-
'SSL': _environ_get_and_map('REDIS_SSL', 'False', _EQUALS_TRUE),
90-
'INSECURE_SKIP_TLS_VERIFY': _environ_get_and_map('REDIS_INSECURE_SKIP_TLS_VERIFY', 'False', _EQUALS_TRUE),
89+
'SSL': _environ_get_and_map('REDIS_SSL', 'False', _AS_BOOL),
90+
'INSECURE_SKIP_TLS_VERIFY': _environ_get_and_map('REDIS_INSECURE_SKIP_TLS_VERIFY', 'False', _AS_BOOL),
9191
},
9292
'caching': {
9393
'HOST': environ.get('REDIS_CACHE_HOST', environ.get('REDIS_HOST', 'localhost')),
9494
'PORT': _environ_get_and_map('REDIS_CACHE_PORT', environ.get('REDIS_PORT', '6379'), _AS_INT),
9595
'PASSWORD': _read_secret('redis_cache_password', environ.get('REDIS_CACHE_PASSWORD', environ.get('REDIS_PASSWORD', ''))),
9696
'DATABASE': _environ_get_and_map('REDIS_CACHE_DATABASE', '1', _AS_INT),
97-
'SSL': _environ_get_and_map('REDIS_CACHE_SSL', environ.get('REDIS_SSL', 'False'), _EQUALS_TRUE),
98-
'INSECURE_SKIP_TLS_VERIFY': _environ_get_and_map('REDIS_CACHE_INSECURE_SKIP_TLS_VERIFY', environ.get('REDIS_INSECURE_SKIP_TLS_VERIFY', 'False'), _EQUALS_TRUE),
97+
'SSL': _environ_get_and_map('REDIS_CACHE_SSL', environ.get('REDIS_SSL', 'False'), _AS_BOOL),
98+
'INSECURE_SKIP_TLS_VERIFY': _environ_get_and_map('REDIS_CACHE_INSECURE_SKIP_TLS_VERIFY', environ.get('REDIS_INSECURE_SKIP_TLS_VERIFY', 'False'), _AS_BOOL),
9999
},
100100
}
101101

@@ -119,7 +119,7 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
119119
# ]
120120

121121
if 'ALLOWED_URL_SCHEMES' in environ:
122-
ALLOWED_URL_SCHEMES = _environ_get_and_map('ALLOWED_URL_SCHEMES', None, _SPLIT_ON_SPACE)
122+
ALLOWED_URL_SCHEMES = _environ_get_and_map('ALLOWED_URL_SCHEMES', None, _AS_LIST)
123123

124124
# Optionally display a persistent banner at the top and/or bottom of every page. HTML is allowed. To display the same
125125
# content in both banners, define BANNER_TOP and set BANNER_BOTTOM = BANNER_TOP.
@@ -147,28 +147,28 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
147147
# API Cross-Origin Resource Sharing (CORS) settings. If CORS_ORIGIN_ALLOW_ALL is set to True, all origins will be
148148
# allowed. Otherwise, define a list of allowed origins using either CORS_ORIGIN_WHITELIST or
149149
# CORS_ORIGIN_REGEX_WHITELIST. For more information, see https://github.com/ottoyiu/django-cors-headers
150-
CORS_ORIGIN_ALLOW_ALL = _environ_get_and_map('CORS_ORIGIN_ALLOW_ALL', 'False', _EQUALS_TRUE)
151-
CORS_ORIGIN_WHITELIST = _environ_get_and_map('CORS_ORIGIN_WHITELIST', 'https://localhost', _SPLIT_ON_SPACE)
152-
CORS_ORIGIN_REGEX_WHITELIST = [re.compile(r) for r in _environ_get_and_map('CORS_ORIGIN_REGEX_WHITELIST', '', _SPLIT_ON_SPACE)]
150+
CORS_ORIGIN_ALLOW_ALL = _environ_get_and_map('CORS_ORIGIN_ALLOW_ALL', 'False', _AS_BOOL)
151+
CORS_ORIGIN_WHITELIST = _environ_get_and_map('CORS_ORIGIN_WHITELIST', 'https://localhost', _AS_LIST)
152+
CORS_ORIGIN_REGEX_WHITELIST = [re.compile(r) for r in _environ_get_and_map('CORS_ORIGIN_REGEX_WHITELIST', '', _AS_LIST)]
153153

154154
# Set to True to enable server debugging. WARNING: Debugging introduces a substantial performance penalty and may reveal
155155
# sensitive information about your installation. Only enable debugging while performing testing.
156156
# Never enable debugging on a production system.
157-
DEBUG = _environ_get_and_map('DEBUG', 'False', _EQUALS_TRUE)
157+
DEBUG = _environ_get_and_map('DEBUG', 'False', _AS_BOOL)
158158

159159
# This parameter serves as a safeguard to prevent some potentially dangerous behavior,
160160
# such as generating new database schema migrations.
161161
# Set this to True only if you are actively developing the NetBox code base.
162-
DEVELOPER = _environ_get_and_map('DEVELOPER', 'False', _EQUALS_TRUE)
162+
DEVELOPER = _environ_get_and_map('DEVELOPER', 'False', _AS_BOOL)
163163

164164
# Email settings
165165
EMAIL = {
166166
'SERVER': environ.get('EMAIL_SERVER', 'localhost'),
167167
'PORT': _environ_get_and_map('EMAIL_PORT', 25, _AS_INT),
168168
'USERNAME': environ.get('EMAIL_USERNAME', ''),
169169
'PASSWORD': _read_secret('email_password', environ.get('EMAIL_PASSWORD', '')),
170-
'USE_SSL': _environ_get_and_map('EMAIL_USE_SSL', 'False', _EQUALS_TRUE),
171-
'USE_TLS': _environ_get_and_map('EMAIL_USE_TLS', 'False', _EQUALS_TRUE),
170+
'USE_SSL': _environ_get_and_map('EMAIL_USE_SSL', 'False', _AS_BOOL),
171+
'USE_TLS': _environ_get_and_map('EMAIL_USE_TLS', 'False', _AS_BOOL),
172172
'SSL_CERTFILE': environ.get('EMAIL_SSL_CERTFILE', ''),
173173
'SSL_KEYFILE': environ.get('EMAIL_SSL_KEYFILE', ''),
174174
'TIMEOUT': _environ_get_and_map('EMAIL_TIMEOUT', 10, _AS_INT), # seconds
@@ -178,11 +178,11 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
178178
# Enforcement of unique IP space can be toggled on a per-VRF basis. To enforce unique IP space within the global table
179179
# (all prefixes and IP addresses not assigned to a VRF), set ENFORCE_GLOBAL_UNIQUE to True.
180180
if 'ENFORCE_GLOBAL_UNIQUE' in environ:
181-
ENFORCE_GLOBAL_UNIQUE = _environ_get_and_map('ENFORCE_GLOBAL_UNIQUE', None, _EQUALS_TRUE)
181+
ENFORCE_GLOBAL_UNIQUE = _environ_get_and_map('ENFORCE_GLOBAL_UNIQUE', None, _AS_BOOL)
182182

183183
# Exempt certain models from the enforcement of view permissions. Models listed here will be viewable by all users and
184184
# by anonymous users. List models in the form `<app>.<model>`. Add '*' to this list to exempt all models.
185-
EXEMPT_VIEW_PERMISSIONS = _environ_get_and_map('EXEMPT_VIEW_PERMISSIONS', '', _SPLIT_ON_SPACE)
185+
EXEMPT_VIEW_PERMISSIONS = _environ_get_and_map('EXEMPT_VIEW_PERMISSIONS', '', _AS_LIST)
186186

187187
# HTTP proxies NetBox should use when sending outbound HTTP requests (e.g. for webhooks).
188188
# HTTP_PROXIES = {
@@ -192,31 +192,31 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
192192

193193
# IP addresses recognized as internal to the system. The debugging toolbar will be available only to clients accessing
194194
# NetBox from an internal IP.
195-
INTERNAL_IPS = _environ_get_and_map('INTERNAL_IPS', '127.0.0.1 ::1', _SPLIT_ON_SPACE)
195+
INTERNAL_IPS = _environ_get_and_map('INTERNAL_IPS', '127.0.0.1 ::1', _AS_LIST)
196196

197197
# Enable GraphQL API.
198198
if 'GRAPHQL_ENABLED' in environ:
199-
GRAPHQL_ENABLED = _environ_get_and_map('GRAPHQL_ENABLED', None, _EQUALS_TRUE)
199+
GRAPHQL_ENABLED = _environ_get_and_map('GRAPHQL_ENABLED', None, _AS_BOOL)
200200

201201
# # Enable custom logging. Please see the Django documentation for detailed guidance on configuring custom logs:
202202
# # https://docs.djangoproject.com/en/stable/topics/logging/
203203
# LOGGING = {}
204204

205205
# Automatically reset the lifetime of a valid session upon each authenticated request. Enables users to remain
206206
# authenticated to NetBox indefinitely.
207-
LOGIN_PERSISTENCE = _environ_get_and_map('LOGIN_PERSISTENCE', 'False', _EQUALS_TRUE)
207+
LOGIN_PERSISTENCE = _environ_get_and_map('LOGIN_PERSISTENCE', 'False', _AS_BOOL)
208208

209209
# Setting this to True will permit only authenticated users to access any part of NetBox. By default, anonymous users
210210
# are permitted to access most data in NetBox (excluding secrets) but not make any changes.
211-
LOGIN_REQUIRED = _environ_get_and_map('LOGIN_REQUIRED', 'False', _EQUALS_TRUE)
211+
LOGIN_REQUIRED = _environ_get_and_map('LOGIN_REQUIRED', 'False', _AS_BOOL)
212212

213213
# The length of time (in seconds) for which a user will remain logged into the web UI before being prompted to
214214
# re-authenticate. (Default: 1209600 [14 days])
215215
LOGIN_TIMEOUT = _environ_get_and_map('LOGIN_TIMEOUT', 1209600, _AS_INT)
216216

217217
# Setting this to True will display a "maintenance mode" banner at the top of every page.
218218
if 'MAINTENANCE_MODE' in environ:
219-
MAINTENANCE_MODE = _environ_get_and_map('MAINTENANCE_MODE', None, _EQUALS_TRUE)
219+
MAINTENANCE_MODE = _environ_get_and_map('MAINTENANCE_MODE', None, _AS_BOOL)
220220

221221
# Maps provider
222222
if 'MAPS_URL' in environ:
@@ -233,7 +233,7 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
233233
MEDIA_ROOT = environ.get('MEDIA_ROOT', join(_BASE_DIR, 'media'))
234234

235235
# Expose Prometheus monitoring metrics at the HTTP endpoint '/metrics'
236-
METRICS_ENABLED = _environ_get_and_map('METRICS_ENABLED', 'False', _EQUALS_TRUE)
236+
METRICS_ENABLED = _environ_get_and_map('METRICS_ENABLED', 'False', _AS_BOOL)
237237

238238
# Credentials that NetBox will uses to authenticate to devices when connecting via NAPALM.
239239
if 'NAPALM_USERNAME' in environ:
@@ -264,7 +264,7 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
264264
# When determining the primary IP address for a device, IPv6 is preferred over IPv4 by default. Set this to True to
265265
# prefer IPv4 instead.
266266
if 'PREFER_IPV4' in environ:
267-
PREFER_IPV4 = _environ_get_and_map('PREFER_IPV4', None, _EQUALS_TRUE)
267+
PREFER_IPV4 = _environ_get_and_map('PREFER_IPV4', None, _AS_BOOL)
268268

269269
# The default value for the amperage field when creating new power feeds.
270270
if 'POWERFEED_DEFAULT_AMPERAGE' in environ:
@@ -285,11 +285,11 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
285285
RACK_ELEVATION_DEFAULT_UNIT_WIDTH = _environ_get_and_map('RACK_ELEVATION_DEFAULT_UNIT_WIDTH', None, _AS_INT)
286286

287287
# Remote authentication support
288-
REMOTE_AUTH_ENABLED = _environ_get_and_map('REMOTE_AUTH_ENABLED', 'False', _EQUALS_TRUE)
288+
REMOTE_AUTH_ENABLED = _environ_get_and_map('REMOTE_AUTH_ENABLED', 'False', _AS_BOOL)
289289
REMOTE_AUTH_BACKEND = environ.get('REMOTE_AUTH_BACKEND', 'netbox.authentication.RemoteUserBackend')
290290
REMOTE_AUTH_HEADER = environ.get('REMOTE_AUTH_HEADER', 'HTTP_REMOTE_USER')
291-
REMOTE_AUTH_AUTO_CREATE_USER = _environ_get_and_map('REMOTE_AUTH_AUTO_CREATE_USER', 'True', _EQUALS_TRUE)
292-
REMOTE_AUTH_DEFAULT_GROUPS = _environ_get_and_map('REMOTE_AUTH_DEFAULT_GROUPS', '', _SPLIT_ON_SPACE)
291+
REMOTE_AUTH_AUTO_CREATE_USER = _environ_get_and_map('REMOTE_AUTH_AUTO_CREATE_USER', 'True', _AS_BOOL)
292+
REMOTE_AUTH_DEFAULT_GROUPS = _environ_get_and_map('REMOTE_AUTH_DEFAULT_GROUPS', '', _AS_LIST)
293293
# REMOTE_AUTH_DEFAULT_PERMISSIONS = {}
294294

295295
# This repository is used to check whether there is a new release of NetBox available. Set to None to disable the
@@ -314,7 +314,7 @@ def _environ_get_and_map(variable_name: str, default: str | None = None, map_fn:
314314
# Cross-Site-Request-Forgery-Attack settings. If Netbox is sitting behind a reverse proxy, you might need to set the CSRF_TRUSTED_ORIGINS flag.
315315
# Django 4.0 requires to specify the URL Scheme in this setting. An example environment variable could be specified like:
316316
# CSRF_TRUSTED_ORIGINS=https://demo.netbox.dev http://demo.netbox.dev
317-
CSRF_TRUSTED_ORIGINS = _environ_get_and_map('CSRF_TRUSTED_ORIGINS', '', _SPLIT_ON_SPACE)
317+
CSRF_TRUSTED_ORIGINS = _environ_get_and_map('CSRF_TRUSTED_ORIGINS', '', _AS_LIST)
318318

319319
# The name to use for the session cookie.
320320
SESSION_COOKIE_NAME = environ.get('SESSION_COOKIE_NAME', 'sessionid')

0 commit comments

Comments
 (0)