prod.exs 2.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
  1. use Mix.Config
  2. # For production, don't forget to configure the url host
  3. # to something meaningful, Phoenix uses this information
  4. # when generating URLs.
  5. #
  6. # Note we also include the path to a cache manifest
  7. # containing the digested version of static files. This
  8. # manifest is generated by the `mix phx.digest` task,
  9. # which you should run after static files are built and
  10. # before starting your production server.
  11. config :openpod, OpenpodWeb.Endpoint,
  12. load_from_system_env: true,
  13. url: [scheme: "https", host: "other-unwilling-barasinga.gigalixirapp.com", port: 443],
  14. http: [port: {:system, "PORT"}],
  15. cache_static_manifest: "priv/static/cache_manifest.json",
  16. server: true,
  17. root: ".",
  18. version: Application.spec(:phoenix_distillery, :vsn)
  19. # force_ssl: [rewrite_on: [:x_forwarded_proto]]
  20. config :openpod,
  21. cache_duration: :timer.hours(24)
  22. # Do not print debug messages in production
  23. config :logger, level: :info
  24. # ## SSL Support
  25. #
  26. # To get SSL working, you will need to add the `https` key
  27. # to the previous section and set your `:url` port to 443:
  28. #
  29. # config :openpod, OpenpodWeb.Endpoint,
  30. # ...
  31. # url: [host: "example.com", port: 443],
  32. # https: [
  33. # port: 443,
  34. # cipher_suite: :strong,
  35. # keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
  36. # certfile: System.get_env("SOME_APP_SSL_CERT_PATH"),
  37. # transport_options: [socket_opts: [:inet6]]
  38. # ]
  39. #
  40. # The `cipher_suite` is set to `:strong` to support only the
  41. # latest and more secure SSL ciphers. This means old browsers
  42. # and clients may not be supported. You can set it to
  43. # `:compatible` for wider support.
  44. #
  45. # `:keyfile` and `:certfile` expect an absolute path to the key
  46. # and cert in disk or a relative path inside priv, for example
  47. # "priv/ssl/server.key". For all supported SSL configuration
  48. # options, see https://hexdocs.pm/plug/Plug.SSL.html#configure/1
  49. #
  50. # We also recommend setting `force_ssl` in your endpoint, ensuring
  51. # no data is ever sent via http, always redirecting to https:
  52. #
  53. # config :openpod, OpenpodWeb.Endpoint,
  54. # force_ssl: [hsts: true]
  55. #
  56. # Check `Plug.SSL` for all available options in `force_ssl`.