aboutsummaryrefslogtreecommitdiff
path: root/config/prod.exs
diff options
context:
space:
mode:
authorneodarz <neodarz@neodarz.net>2017-01-24 17:09:18 +0100
committerneodarz <neodarz@neodarz.net>2017-01-24 17:09:18 +0100
commit033d07a519bac03fdfd28ca15e09cc287e80fd14 (patch)
treed623a1806c64ad84d7c88b0762ae6eb26ed14ce0 /config/prod.exs
downloadthe_transcriber_backend-033d07a519bac03fdfd28ca15e09cc287e80fd14.tar.xz
the_transcriber_backend-033d07a519bac03fdfd28ca15e09cc287e80fd14.zip
Initial commit with non-functional pieces of code about file upload
Diffstat (limited to 'config/prod.exs')
-rw-r--r--config/prod.exs61
1 files changed, 61 insertions, 0 deletions
diff --git a/config/prod.exs b/config/prod.exs
new file mode 100644
index 0000000..2ebca1c
--- /dev/null
+++ b/config/prod.exs
@@ -0,0 +1,61 @@
+use Mix.Config
+
+# For production, we configure the host to read the PORT
+# from the system environment. Therefore, you will need
+# to set PORT=80 before running your server.
+#
+# You should also configure the url host to something
+# meaningful, we use this information when generating URLs.
+#
+# Finally, we also include the path to a manifest
+# containing the digested version of static files. This
+# manifest is generated by the mix phoenix.digest task
+# which you typically run after static files are built.
+config :the_transcriber_backend, TheTranscriberBackend.Endpoint,
+ http: [port: {:system, "PORT"}],
+ url: [host: "example.com", port: 80],
+ cache_static_manifest: "priv/static/manifest.json"
+
+# Do not print debug messages in production
+config :logger, level: :info
+
+# ## SSL Support
+#
+# To get SSL working, you will need to add the `https` key
+# to the previous section and set your `:url` port to 443:
+#
+# config :the_transcriber_backend, TheTranscriberBackend.Endpoint,
+# ...
+# url: [host: "example.com", port: 443],
+# https: [port: 443,
+# keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
+# certfile: System.get_env("SOME_APP_SSL_CERT_PATH")]
+#
+# Where those two env variables return an absolute path to
+# the key and cert in disk or a relative path inside priv,
+# for example "priv/ssl/server.key".
+#
+# We also recommend setting `force_ssl`, ensuring no data is
+# ever sent via http, always redirecting to https:
+#
+# config :the_transcriber_backend, TheTranscriberBackend.Endpoint,
+# force_ssl: [hsts: true]
+#
+# Check `Plug.SSL` for all available options in `force_ssl`.
+
+# ## Using releases
+#
+# If you are doing OTP releases, you need to instruct Phoenix
+# to start the server for all endpoints:
+#
+# config :phoenix, :serve_endpoints, true
+#
+# Alternatively, you can configure exactly which server to
+# start per endpoint:
+#
+# config :the_transcriber_backend, TheTranscriberBackend.Endpoint, server: true
+#
+
+# Finally import the config/prod.secret.exs
+# which should be versioned separately.
+import_config "prod.secret.exs"