open-pod/config/prod.exs

61 lines
2.1 KiB
Elixir
Raw Permalink Normal View History

2020-05-22 22:04:15 +02:00
use Mix.Config
# For production, don't forget to configure the url host
# to something meaningful, Phoenix uses this information
# when generating URLs.
#
# Note we also include the path to a cache manifest
# containing the digested version of static files. This
# manifest is generated by the `mix phx.digest` task,
# which you should run after static files are built and
# before starting your production server.
2020-06-08 23:37:11 +02:00
config :openpod, OpenpodWeb.Endpoint,
load_from_system_env: true,
2020-06-07 23:14:31 +02:00
url: [scheme: "https", host: "other-unwilling-barasinga.gigalixirapp.com", port: 443],
http: [port: {:system, "PORT"}],
cache_static_manifest: "priv/static/cache_manifest.json",
server: true,
root: ".",
2020-06-08 23:01:05 +02:00
version: Application.spec(:phoenix_distillery, :vsn)
# force_ssl: [rewrite_on: [:x_forwarded_proto]]
2020-05-22 22:04:15 +02:00
2020-06-08 23:37:11 +02:00
config :openpod,
2020-06-07 21:37:41 +02:00
cache_duration: :timer.hours(24)
2020-05-22 22:04:15 +02:00
# Do not print debug messages in production
config :logger, level: :info
# ## SSL Support
#
# To get SSL working, you will need to add the `https` key
# to the previous section and set your `:url` port to 443:
#
2020-06-08 23:37:11 +02:00
# config :openpod, OpenpodWeb.Endpoint,
2020-05-22 22:04:15 +02:00
# ...
# url: [host: "example.com", port: 443],
# https: [
# port: 443,
# cipher_suite: :strong,
# keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
# certfile: System.get_env("SOME_APP_SSL_CERT_PATH"),
# transport_options: [socket_opts: [:inet6]]
# ]
#
# The `cipher_suite` is set to `:strong` to support only the
# latest and more secure SSL ciphers. This means old browsers
# and clients may not be supported. You can set it to
# `:compatible` for wider support.
#
# `:keyfile` and `:certfile` expect an absolute path to the key
# and cert in disk or a relative path inside priv, for example
# "priv/ssl/server.key". For all supported SSL configuration
# options, see https://hexdocs.pm/plug/Plug.SSL.html#configure/1
#
# We also recommend setting `force_ssl` in your endpoint, ensuring
# no data is ever sent via http, always redirecting to https:
#
2020-06-08 23:37:11 +02:00
# config :openpod, OpenpodWeb.Endpoint,
2020-05-22 22:04:15 +02:00
# force_ssl: [hsts: true]
#
# Check `Plug.SSL` for all available options in `force_ssl`.