forked from AkkomaGang/akkoma
53 lines
1.5 KiB
Elixir
53 lines
1.5 KiB
Elixir
|
defmodule Pleroma.Web.Endpoint do
|
||
|
use Phoenix.Endpoint, otp_app: :pleroma
|
||
|
|
||
|
socket "/socket", Pleroma.Web.UserSocket
|
||
|
|
||
|
# Serve at "/" the static files from "priv/static" directory.
|
||
|
#
|
||
|
# You should set gzip to true if you are running phoenix.digest
|
||
|
# when deploying your static files in production.
|
||
|
plug Plug.Static,
|
||
|
at: "/", from: :pleroma, gzip: false,
|
||
|
only: ~w(css fonts images js favicon.ico robots.txt)
|
||
|
|
||
|
# Code reloading can be explicitly enabled under the
|
||
|
# :code_reloader configuration of your endpoint.
|
||
|
if code_reloading? do
|
||
|
plug Phoenix.CodeReloader
|
||
|
end
|
||
|
|
||
|
plug Plug.RequestId
|
||
|
plug Plug.Logger
|
||
|
|
||
|
plug Plug.Parsers,
|
||
|
parsers: [:urlencoded, :multipart, :json],
|
||
|
pass: ["*/*"],
|
||
|
json_decoder: Poison
|
||
|
|
||
|
plug Plug.MethodOverride
|
||
|
plug Plug.Head
|
||
|
|
||
|
# The session will be stored in the cookie and signed,
|
||
|
# this means its contents can be read but not tampered with.
|
||
|
# Set :encryption_salt if you would also like to encrypt it.
|
||
|
plug Plug.Session,
|
||
|
store: :cookie,
|
||
|
key: "_pleroma_key",
|
||
|
signing_salt: "CqaoopA2"
|
||
|
|
||
|
plug Pleroma.Web.Router
|
||
|
|
||
|
@doc """
|
||
|
Dynamically loads configuration from the system environment
|
||
|
on startup.
|
||
|
|
||
|
It receives the endpoint configuration from the config files
|
||
|
and must return the updated configuration.
|
||
|
"""
|
||
|
def load_from_system_env(config) do
|
||
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
||
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
||
|
end
|
||
|
end
|