Provides diagnostic information about a page's compatibility with IndieWeb specs
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

prod.exs 2.4KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071
  1. use Mix.Config
  2. # For production, don't forget to configure the url host
  3. # to something meaningful, Phoenix uses this information
  4. # when generating URLs.
  5. #
  6. # Note we also include the path to a cache manifest
  7. # containing the digested version of static files. This
  8. # manifest is generated by the `mix phx.digest` task,
  9. # which you should run after static files are built and
  10. # before starting your production server.
  11. config :checkup, CheckupWeb.Endpoint,
  12. http: [:inet6, port: System.get_env("PORT") || 4000],
  13. url: [host: "example.com", port: 80],
  14. cache_static_manifest: "priv/static/cache_manifest.json"
  15. # Do not print debug messages in production
  16. config :logger, level: :info
  17. # ## SSL Support
  18. #
  19. # To get SSL working, you will need to add the `https` key
  20. # to the previous section and set your `:url` port to 443:
  21. #
  22. # config :checkup, CheckupWeb.Endpoint,
  23. # ...
  24. # url: [host: "example.com", port: 443],
  25. # https: [
  26. # :inet6,
  27. # port: 443,
  28. # cipher_suite: :strong,
  29. # keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
  30. # certfile: System.get_env("SOME_APP_SSL_CERT_PATH")
  31. # ]
  32. #
  33. # The `cipher_suite` is set to `:strong` to support only the
  34. # latest and more secure SSL ciphers. This means old browsers
  35. # and clients may not be supported. You can set it to
  36. # `:compatible` for wider support.
  37. #
  38. # `:keyfile` and `:certfile` expect an absolute path to the key
  39. # and cert in disk or a relative path inside priv, for example
  40. # "priv/ssl/server.key". For all supported SSL configuration
  41. # options, see https://hexdocs.pm/plug/Plug.SSL.html#configure/1
  42. #
  43. # We also recommend setting `force_ssl` in your endpoint, ensuring
  44. # no data is ever sent via http, always redirecting to https:
  45. #
  46. # config :checkup, CheckupWeb.Endpoint,
  47. # force_ssl: [hsts: true]
  48. #
  49. # Check `Plug.SSL` for all available options in `force_ssl`.
  50. # ## Using releases (distillery)
  51. #
  52. # If you are doing OTP releases, you need to instruct Phoenix
  53. # to start the server for all endpoints:
  54. #
  55. # config :phoenix, :serve_endpoints, true
  56. #
  57. # Alternatively, you can configure exactly which server to
  58. # start per endpoint:
  59. #
  60. # config :checkup, CheckupWeb.Endpoint, server: true
  61. #
  62. # Note you can't rely on `System.get_env/1` when using releases.
  63. # See the releases documentation accordingly.
  64. # Finally import the config/prod.secret.exs which should be versioned
  65. # separately.
  66. import_config "prod.secret.exs"