diff options
author | neodarz <neodarz@neodarz.net> | 2017-01-24 17:09:18 +0100 |
---|---|---|
committer | neodarz <neodarz@neodarz.net> | 2017-01-24 17:09:18 +0100 |
commit | 033d07a519bac03fdfd28ca15e09cc287e80fd14 (patch) | |
tree | d623a1806c64ad84d7c88b0762ae6eb26ed14ce0 /config/prod.exs | |
download | the_transcriber_backend-033d07a519bac03fdfd28ca15e09cc287e80fd14.tar.xz the_transcriber_backend-033d07a519bac03fdfd28ca15e09cc287e80fd14.zip |
Initial commit with non-functional pieces of code about file upload
Diffstat (limited to 'config/prod.exs')
-rw-r--r-- | config/prod.exs | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/config/prod.exs b/config/prod.exs new file mode 100644 index 0000000..2ebca1c --- /dev/null +++ b/config/prod.exs @@ -0,0 +1,61 @@ +use Mix.Config + +# For production, we configure the host to read the PORT +# from the system environment. Therefore, you will need +# to set PORT=80 before running your server. +# +# You should also configure the url host to something +# meaningful, we use this information when generating URLs. +# +# Finally, we also include the path to a manifest +# containing the digested version of static files. This +# manifest is generated by the mix phoenix.digest task +# which you typically run after static files are built. +config :the_transcriber_backend, TheTranscriberBackend.Endpoint, + http: [port: {:system, "PORT"}], + url: [host: "example.com", port: 80], + cache_static_manifest: "priv/static/manifest.json" + +# Do not print debug messages in production +config :logger, level: :info + +# ## SSL Support +# +# To get SSL working, you will need to add the `https` key +# to the previous section and set your `:url` port to 443: +# +# config :the_transcriber_backend, TheTranscriberBackend.Endpoint, +# ... +# url: [host: "example.com", port: 443], +# https: [port: 443, +# keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"), +# certfile: System.get_env("SOME_APP_SSL_CERT_PATH")] +# +# Where those two env variables return an absolute path to +# the key and cert in disk or a relative path inside priv, +# for example "priv/ssl/server.key". +# +# We also recommend setting `force_ssl`, ensuring no data is +# ever sent via http, always redirecting to https: +# +# config :the_transcriber_backend, TheTranscriberBackend.Endpoint, +# force_ssl: [hsts: true] +# +# Check `Plug.SSL` for all available options in `force_ssl`. + +# ## Using releases +# +# If you are doing OTP releases, you need to instruct Phoenix +# to start the server for all endpoints: +# +# config :phoenix, :serve_endpoints, true +# +# Alternatively, you can configure exactly which server to +# start per endpoint: +# +# config :the_transcriber_backend, TheTranscriberBackend.Endpoint, server: true +# + +# Finally import the config/prod.secret.exs +# which should be versioned separately. +import_config "prod.secret.exs" |