2017-03-17 10:09:58 -06:00
|
|
|
defmodule Pleroma.Web.Endpoint do
|
|
|
|
use Phoenix.Endpoint, otp_app: :pleroma
|
|
|
|
|
|
|
|
socket "/socket", Pleroma.Web.UserSocket
|
|
|
|
|
|
|
|
# Serve at "/" the static files from "priv/static" directory.
|
|
|
|
#
|
|
|
|
# You should set gzip to true if you are running phoenix.digest
|
|
|
|
# when deploying your static files in production.
|
|
|
|
plug Plug.Static,
|
2017-03-28 18:05:51 -06:00
|
|
|
at: "/media", from: "uploads", gzip: false
|
2017-04-19 07:25:18 -06:00
|
|
|
plug Plug.Static,
|
|
|
|
at: "/", from: :pleroma,
|
|
|
|
only: ~w(index.html static)
|
2017-03-17 10:09:58 -06:00
|
|
|
|
|
|
|
# Code reloading can be explicitly enabled under the
|
|
|
|
# :code_reloader configuration of your endpoint.
|
|
|
|
if code_reloading? do
|
|
|
|
plug Phoenix.CodeReloader
|
|
|
|
end
|
|
|
|
|
2017-03-23 18:16:28 -06:00
|
|
|
plug TrailingFormatPlug
|
2017-03-17 10:09:58 -06:00
|
|
|
plug Plug.RequestId
|
|
|
|
plug Plug.Logger
|
|
|
|
|
|
|
|
plug Plug.Parsers,
|
|
|
|
parsers: [:urlencoded, :multipart, :json],
|
|
|
|
pass: ["*/*"],
|
|
|
|
json_decoder: Poison
|
|
|
|
|
|
|
|
plug Plug.MethodOverride
|
|
|
|
plug Plug.Head
|
|
|
|
|
|
|
|
# The session will be stored in the cookie and signed,
|
|
|
|
# this means its contents can be read but not tampered with.
|
|
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
|
|
|
plug Plug.Session,
|
|
|
|
store: :cookie,
|
|
|
|
key: "_pleroma_key",
|
|
|
|
signing_salt: "CqaoopA2"
|
|
|
|
|
|
|
|
plug Pleroma.Web.Router
|
|
|
|
|
|
|
|
@doc """
|
|
|
|
Dynamically loads configuration from the system environment
|
|
|
|
on startup.
|
|
|
|
|
|
|
|
It receives the endpoint configuration from the config files
|
|
|
|
and must return the updated configuration.
|
|
|
|
"""
|
|
|
|
def load_from_system_env(config) do
|
|
|
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
|
|
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
|
|
|
end
|
|
|
|
end
|