2017-03-17 16:09:58 +00:00
|
|
|
defmodule Pleroma.Web.Endpoint do
|
|
|
|
use Phoenix.Endpoint, otp_app: :pleroma
|
|
|
|
|
2018-11-16 20:35:08 +00:00
|
|
|
socket("/socket", Pleroma.Web.UserSocket)
|
2018-03-30 14:01:53 +01:00
|
|
|
|
2017-03-17 16:09:58 +00:00
|
|
|
# Serve at "/" the static files from "priv/static" directory.
|
|
|
|
#
|
|
|
|
# You should set gzip to true if you are running phoenix.digest
|
|
|
|
# when deploying your static files in production.
|
2018-11-10 11:23:50 +00:00
|
|
|
plug(CORSPlug)
|
2018-11-12 15:08:02 +00:00
|
|
|
plug(Pleroma.Plugs.HTTPSecurityPlug)
|
2018-11-10 11:23:50 +00:00
|
|
|
|
2018-11-23 16:40:45 +00:00
|
|
|
plug(Pleroma.Plugs.UploadedMedia)
|
2018-03-30 14:01:53 +01:00
|
|
|
|
|
|
|
plug(
|
|
|
|
Plug.Static,
|
|
|
|
at: "/",
|
|
|
|
from: :pleroma,
|
2018-11-10 11:18:25 +00:00
|
|
|
only:
|
|
|
|
~w(index.html static finmoji emoji packs sounds images instance sw.js favicon.png schemas)
|
2018-03-30 14:01:53 +01:00
|
|
|
)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
|
|
|
# Code reloading can be explicitly enabled under the
|
|
|
|
# :code_reloader configuration of your endpoint.
|
|
|
|
if code_reloading? do
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(Phoenix.CodeReloader)
|
2017-03-17 16:09:58 +00:00
|
|
|
end
|
|
|
|
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(TrailingFormatPlug)
|
|
|
|
plug(Plug.RequestId)
|
|
|
|
plug(Plug.Logger)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(
|
|
|
|
Plug.Parsers,
|
2017-03-17 16:09:58 +00:00
|
|
|
parsers: [:urlencoded, :multipart, :json],
|
|
|
|
pass: ["*/*"],
|
2018-04-01 00:43:03 +01:00
|
|
|
json_decoder: Jason,
|
2018-08-01 00:17:47 +01:00
|
|
|
length: Application.get_env(:pleroma, :instance) |> Keyword.get(:upload_limit),
|
|
|
|
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
|
2018-03-30 14:01:53 +01:00
|
|
|
)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(Plug.MethodOverride)
|
|
|
|
plug(Plug.Head)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
2018-11-12 23:32:38 +00:00
|
|
|
cookie_name =
|
|
|
|
if Application.get_env(:pleroma, Pleroma.Web.Endpoint) |> Keyword.get(:secure_cookie_flag),
|
|
|
|
do: "__Host-pleroma_key",
|
|
|
|
else: "pleroma_key"
|
|
|
|
|
2017-03-17 16:09:58 +00:00
|
|
|
# The session will be stored in the cookie and signed,
|
|
|
|
# this means its contents can be read but not tampered with.
|
|
|
|
# Set :encryption_salt if you would also like to encrypt it.
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(
|
|
|
|
Plug.Session,
|
2017-03-17 16:09:58 +00:00
|
|
|
store: :cookie,
|
2018-11-12 23:32:38 +00:00
|
|
|
key: cookie_name,
|
2018-11-16 20:35:08 +00:00
|
|
|
signing_salt: {Pleroma.Config, :get, [[__MODULE__, :signing_salt], "CqaoopA2"]},
|
2018-08-28 21:34:31 +01:00
|
|
|
http_only: true,
|
2018-08-27 23:47:34 +01:00
|
|
|
secure:
|
|
|
|
Application.get_env(:pleroma, Pleroma.Web.Endpoint) |> Keyword.get(:secure_cookie_flag),
|
2018-08-28 13:03:29 +01:00
|
|
|
extra: "SameSite=Strict"
|
2018-03-30 14:01:53 +01:00
|
|
|
)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
2018-03-30 14:01:53 +01:00
|
|
|
plug(Pleroma.Web.Router)
|
2017-03-17 16:09:58 +00:00
|
|
|
|
|
|
|
@doc """
|
|
|
|
Dynamically loads configuration from the system environment
|
|
|
|
on startup.
|
|
|
|
|
|
|
|
It receives the endpoint configuration from the config files
|
|
|
|
and must return the updated configuration.
|
|
|
|
"""
|
|
|
|
def load_from_system_env(config) do
|
|
|
|
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
|
|
|
|
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
|
|
|
|
end
|
|
|
|
end
|