Pleroma/lib/pleroma/web/endpoint.ex

82 lines
2.3 KiB
Elixir
Raw Normal View History

2017-03-17 17:09:58 +01:00
defmodule Pleroma.Web.Endpoint do
use Phoenix.Endpoint, otp_app: :pleroma
if Application.get_env(:pleroma, :chat) |> Keyword.get(:enabled) do
2018-03-30 15:01:53 +02:00
socket("/socket", Pleroma.Web.UserSocket)
end
2018-03-30 15:01:53 +02:00
socket("/api/v1", Pleroma.Web.MastodonAPI.MastodonSocket)
2017-03-17 17:09:58 +01:00
# Serve at "/" the static files from "priv/static" directory.
#
# You should set gzip to true if you are running phoenix.digest
# when deploying your static files in production.
plug(CORSPlug)
2018-11-12 16:08:02 +01:00
plug(Pleroma.Plugs.HTTPSecurityPlug)
2018-08-28 03:45:53 +02:00
plug(Plug.Static, at: "/media", from: Pleroma.Uploaders.Local.upload_path(), gzip: false)
2018-03-30 15:01:53 +02:00
plug(
Plug.Static,
at: "/",
from: :pleroma,
2018-11-10 12:18:25 +01:00
only:
~w(index.html static finmoji emoji packs sounds images instance sw.js favicon.png schemas)
2018-03-30 15:01:53 +02:00
)
2017-03-17 17:09:58 +01:00
# Code reloading can be explicitly enabled under the
# :code_reloader configuration of your endpoint.
if code_reloading? do
2018-03-30 15:01:53 +02:00
plug(Phoenix.CodeReloader)
2017-03-17 17:09:58 +01:00
end
2018-03-30 15:01:53 +02:00
plug(TrailingFormatPlug)
plug(Plug.RequestId)
plug(Plug.Logger)
2017-03-17 17:09:58 +01:00
2018-03-30 15:01:53 +02:00
plug(
Plug.Parsers,
2017-03-17 17:09:58 +01:00
parsers: [:urlencoded, :multipart, :json],
pass: ["*/*"],
json_decoder: Jason,
length: Application.get_env(:pleroma, :instance) |> Keyword.get(:upload_limit),
body_reader: {Pleroma.Web.Plugs.DigestPlug, :read_body, []}
2018-03-30 15:01:53 +02:00
)
2017-03-17 17:09:58 +01:00
2018-03-30 15:01:53 +02:00
plug(Plug.MethodOverride)
plug(Plug.Head)
2017-03-17 17:09:58 +01:00
cookie_name =
if Application.get_env(:pleroma, Pleroma.Web.Endpoint) |> Keyword.get(:secure_cookie_flag),
do: "__Host-pleroma_key",
else: "pleroma_key"
2017-03-17 17:09:58 +01:00
# The session will be stored in the cookie and signed,
# this means its contents can be read but not tampered with.
# Set :encryption_salt if you would also like to encrypt it.
2018-03-30 15:01:53 +02:00
plug(
Plug.Session,
2017-03-17 17:09:58 +01:00
store: :cookie,
key: cookie_name,
2018-08-28 00:40:58 +02:00
signing_salt: "CqaoopA2",
2018-08-28 22:34:31 +02:00
http_only: true,
2018-08-28 00:47:34 +02:00
secure:
Application.get_env(:pleroma, Pleroma.Web.Endpoint) |> Keyword.get(:secure_cookie_flag),
2018-08-28 14:03:29 +02:00
extra: "SameSite=Strict"
2018-03-30 15:01:53 +02:00
)
2017-03-17 17:09:58 +01:00
2018-03-30 15:01:53 +02:00
plug(Pleroma.Web.Router)
2017-03-17 17:09:58 +01:00
@doc """
Dynamically loads configuration from the system environment
on startup.
It receives the endpoint configuration from the config files
and must return the updated configuration.
"""
def load_from_system_env(config) do
port = System.get_env("PORT") || raise "expected the PORT environment variable to be set"
{:ok, Keyword.put(config, :http, [:inet6, port: port])}
end
end