2023-07-12 09:47:08 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
require "active_support/core_ext/integer/time"
|
|
|
|
|
2016-02-20 22:53:20 +01:00
|
|
|
Rails.application.configure do
|
|
|
|
# Settings specified here will take precedence over those in config/application.rb.
|
|
|
|
|
|
|
|
# Code is not reloaded between requests.
|
2023-10-25 15:56:09 +02:00
|
|
|
config.enable_reloading = false
|
2016-02-20 22:53:20 +01:00
|
|
|
|
|
|
|
# Eager load code on boot. This eager loads most of Rails and
|
|
|
|
# your application in memory, allowing both threaded web servers
|
|
|
|
# and those relying on copy on write to perform better.
|
|
|
|
# Rake tasks automatically ignore this option for performance.
|
|
|
|
config.eager_load = true
|
|
|
|
|
|
|
|
# Full error reports are disabled and caching is turned on.
|
|
|
|
config.consider_all_requests_local = false
|
2016-10-22 19:38:47 +02:00
|
|
|
config.action_controller.perform_caching = true
|
2018-10-12 02:19:10 +02:00
|
|
|
config.action_controller.asset_host = ENV['CDN_HOST'] if ENV['CDN_HOST'].present?
|
2016-02-20 22:53:20 +01:00
|
|
|
|
2023-10-25 15:56:09 +02:00
|
|
|
# Ensures that a master key has been made available in ENV["RAILS_MASTER_KEY"], config/master.key, or an environment
|
|
|
|
# key such as config/credentials/production.key. This key is used to decrypt credentials (and other encrypted files).
|
2018-04-12 14:45:17 +02:00
|
|
|
# config.require_master_key = true
|
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
# Compress CSS using a preprocessor.
|
|
|
|
# config.assets.css_compressor = :sass
|
2017-05-09 05:15:54 +02:00
|
|
|
|
2016-02-20 22:53:20 +01:00
|
|
|
# Do not fallback to assets pipeline if a precompiled asset is missed.
|
|
|
|
config.assets.compile = false
|
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
# Enable serving of images, stylesheets, and JavaScripts from an asset server.
|
|
|
|
# config.asset_host = "http://assets.example.com"
|
|
|
|
|
2016-02-20 22:53:20 +01:00
|
|
|
# Specifies the header that your server uses for sending files.
|
2023-03-16 02:55:13 +01:00
|
|
|
config.action_dispatch.x_sendfile_header = ENV['SENDFILE_HEADER'] if ENV['SENDFILE_HEADER'].present?
|
2023-07-13 09:36:07 +02:00
|
|
|
# config.action_dispatch.x_sendfile_header = "X-Sendfile" # for Apache
|
|
|
|
# config.action_dispatch.x_sendfile_header = "X-Accel-Redirect" # for NGINX
|
2016-02-20 22:53:20 +01:00
|
|
|
|
2017-01-22 20:35:49 +01:00
|
|
|
# Allow to specify public IP of reverse proxy if it's needed
|
2022-04-19 09:11:58 +02:00
|
|
|
config.action_dispatch.trusted_proxies = ENV['TRUSTED_PROXY_IP'].split(/(?:\s*,\s*|\s+)/).map { |item| IPAddr.new(item) } if ENV['TRUSTED_PROXY_IP'].present?
|
2017-01-22 20:35:49 +01:00
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
# Force all access to the app over SSL, use Strict-Transport-Security, and use secure cookies.
|
2021-03-24 10:44:31 +01:00
|
|
|
config.force_ssl = true
|
|
|
|
config.ssl_options = {
|
|
|
|
redirect: {
|
2023-11-08 13:01:18 +01:00
|
|
|
exclude: ->(request) { request.path.start_with?('/health') || request.headers["Host"].end_with?('.onion') || request.headers["Host"].end_with?('.i2p') }
|
2021-03-24 10:44:31 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-25 15:56:09 +02:00
|
|
|
# Info include generic and useful information about system operation, but avoids logging too much
|
|
|
|
# information to avoid inadvertent exposure of personally identifiable information (PII). If you
|
|
|
|
# want to log everything, set the level to "debug".
|
2017-04-11 23:28:23 +02:00
|
|
|
config.log_level = ENV.fetch('RAILS_LOG_LEVEL', 'info').to_sym
|
2016-02-20 22:53:20 +01:00
|
|
|
|
|
|
|
# Prepend all log lines with the following tags.
|
2017-02-23 02:14:35 +01:00
|
|
|
config.log_tags = [:request_id]
|
2016-02-20 22:53:20 +01:00
|
|
|
|
2017-05-22 15:01:02 +02:00
|
|
|
# Use a different cache store in production.
|
2021-03-17 10:09:55 +01:00
|
|
|
config.cache_store = :redis_cache_store, REDIS_CACHE_PARAMS
|
2017-05-22 15:01:02 +02:00
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
# Use a real queuing backend for Active Job (and separate queues per environment).
|
|
|
|
# config.active_job.queue_adapter = :resque
|
|
|
|
# config.active_job.queue_name_prefix = "mastodon_production"
|
|
|
|
|
|
|
|
config.action_mailer.perform_caching = false
|
|
|
|
|
2016-02-20 22:53:20 +01:00
|
|
|
# Ignore bad email addresses and do not raise email delivery errors.
|
|
|
|
# Set this to true and configure the email server for immediate delivery to raise delivery errors.
|
|
|
|
# config.action_mailer.raise_delivery_errors = false
|
|
|
|
|
|
|
|
# Enable locale fallbacks for I18n (makes lookups for any locale fall back to
|
2018-03-20 16:36:20 +01:00
|
|
|
# English when a translation cannot be found).
|
2023-10-25 15:56:09 +02:00
|
|
|
# This setting would typically be `true` to use the `I18n.default_locale`.
|
|
|
|
# Some locales are missing translation entries and would have errors:
|
|
|
|
# https://github.com/mastodon/mastodon/pull/24727
|
2023-04-30 02:22:20 +02:00
|
|
|
config.i18n.fallbacks = [:en]
|
2016-02-20 22:53:20 +01:00
|
|
|
|
2023-10-25 15:56:09 +02:00
|
|
|
# Don't log any deprecations.
|
|
|
|
config.active_support.report_deprecations = false
|
2016-02-20 22:53:20 +01:00
|
|
|
|
|
|
|
# Use default logging formatter so that PID and timestamp are not suppressed.
|
|
|
|
config.log_formatter = ::Logger::Formatter.new
|
|
|
|
|
2016-09-08 01:24:26 +02:00
|
|
|
# Better log formatting
|
|
|
|
config.lograge.enabled = true
|
|
|
|
|
2019-08-18 18:03:56 +02:00
|
|
|
config.lograge.custom_payload do |controller|
|
|
|
|
if controller.respond_to?(:signed_request?) && controller.signed_request?
|
|
|
|
{ key: controller.signature_key_id }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-07-13 09:36:07 +02:00
|
|
|
# Use a different logger for distributed setups.
|
|
|
|
# require "syslog/logger"
|
|
|
|
# config.logger = ActiveSupport::TaggedLogging.new(Syslog::Logger.new "app-name")
|
|
|
|
|
2023-10-25 15:56:09 +02:00
|
|
|
# Log to STDOUT by default
|
|
|
|
config.logger = ActiveSupport::Logger.new(STDOUT)
|
|
|
|
.tap { |logger| logger.formatter = ::Logger::Formatter.new }
|
|
|
|
.then { |logger| ActiveSupport::TaggedLogging.new(logger) }
|
2023-07-13 09:36:07 +02:00
|
|
|
|
2016-02-20 22:53:20 +01:00
|
|
|
# Do not dump schema after migrations.
|
|
|
|
config.active_record.dump_schema_after_migration = false
|
2016-03-16 12:13:40 +01:00
|
|
|
|
2016-08-17 17:56:23 +02:00
|
|
|
config.action_mailer.perform_caching = false
|
|
|
|
|
2016-03-16 12:13:40 +01:00
|
|
|
# E-mails
|
2021-04-19 18:41:29 +02:00
|
|
|
outgoing_email_address = ENV.fetch('SMTP_FROM_ADDRESS', 'notifications@localhost')
|
2022-03-28 09:39:31 +02:00
|
|
|
outgoing_email_domain = Mail::Address.new(outgoing_email_address).domain
|
|
|
|
|
2019-09-02 18:12:40 +02:00
|
|
|
config.action_mailer.default_options = {
|
2021-04-19 18:41:29 +02:00
|
|
|
from: outgoing_email_address,
|
2022-03-28 09:39:31 +02:00
|
|
|
message_id: -> { "<#{Mail.random_tag}@#{outgoing_email_domain}>" },
|
2019-09-02 18:12:40 +02:00
|
|
|
}
|
2017-07-07 00:12:12 +02:00
|
|
|
|
2022-04-07 13:32:12 +02:00
|
|
|
config.action_mailer.default_options[:reply_to] = ENV['SMTP_REPLY_TO'] if ENV['SMTP_REPLY_TO'].present?
|
|
|
|
config.action_mailer.default_options[:return_path] = ENV['SMTP_RETURN_PATH'] if ENV['SMTP_RETURN_PATH'].present?
|
|
|
|
|
2022-11-10 21:06:21 +01:00
|
|
|
enable_starttls = nil
|
|
|
|
enable_starttls_auto = nil
|
|
|
|
|
2022-11-11 01:33:32 +01:00
|
|
|
case ENV['SMTP_ENABLE_STARTTLS']
|
2022-11-10 21:06:21 +01:00
|
|
|
when 'always'
|
|
|
|
enable_starttls = true
|
|
|
|
when 'never'
|
|
|
|
enable_starttls = false
|
|
|
|
when 'auto'
|
|
|
|
enable_starttls_auto = true
|
|
|
|
else
|
|
|
|
enable_starttls_auto = ENV['SMTP_ENABLE_STARTTLS_AUTO'] != 'false'
|
|
|
|
end
|
|
|
|
|
2016-03-16 12:13:40 +01:00
|
|
|
config.action_mailer.smtp_settings = {
|
2022-11-17 11:05:39 +01:00
|
|
|
port: ENV['SMTP_PORT'],
|
|
|
|
address: ENV['SMTP_SERVER'],
|
|
|
|
user_name: ENV['SMTP_LOGIN'].presence,
|
|
|
|
password: ENV['SMTP_PASSWORD'].presence,
|
|
|
|
domain: ENV['SMTP_DOMAIN'] || ENV['LOCAL_DOMAIN'],
|
|
|
|
authentication: ENV['SMTP_AUTH_METHOD'] == 'none' ? nil : ENV['SMTP_AUTH_METHOD'] || :plain,
|
|
|
|
ca_file: ENV['SMTP_CA_FILE'].presence || '/etc/ssl/certs/ca-certificates.crt',
|
|
|
|
openssl_verify_mode: ENV['SMTP_OPENSSL_VERIFY_MODE'],
|
|
|
|
enable_starttls: enable_starttls,
|
|
|
|
enable_starttls_auto: enable_starttls_auto,
|
|
|
|
tls: ENV['SMTP_TLS'].presence && ENV['SMTP_TLS'] == 'true',
|
|
|
|
ssl: ENV['SMTP_SSL'].presence && ENV['SMTP_SSL'] == 'true',
|
2023-03-03 20:37:22 +01:00
|
|
|
read_timeout: 20,
|
2016-03-16 12:13:40 +01:00
|
|
|
}
|
|
|
|
|
2017-04-13 19:51:49 +02:00
|
|
|
config.action_mailer.delivery_method = ENV.fetch('SMTP_DELIVERY_METHOD', 'smtp').to_sym
|
|
|
|
|
2017-03-03 23:45:48 +01:00
|
|
|
config.action_dispatch.default_headers = {
|
2023-10-03 15:24:12 +02:00
|
|
|
'Server' => 'Mastodon',
|
|
|
|
'X-Frame-Options' => 'DENY',
|
2017-03-03 23:45:48 +01:00
|
|
|
'X-Content-Type-Options' => 'nosniff',
|
2023-10-03 15:24:12 +02:00
|
|
|
'X-XSS-Protection' => '0',
|
|
|
|
'Referrer-Policy' => 'same-origin',
|
2017-03-03 23:45:48 +01:00
|
|
|
}
|
2018-03-04 20:28:24 +01:00
|
|
|
|
|
|
|
config.x.otp_secret = ENV.fetch('OTP_SECRET')
|
2023-10-25 15:56:09 +02:00
|
|
|
|
|
|
|
# Enable DNS rebinding protection and other `Host` header attacks.
|
|
|
|
# config.hosts = [
|
|
|
|
# "example.com", # Allow requests from example.com
|
|
|
|
# /.*\.example\.com/ # Allow requests from subdomains like `www.example.com`
|
|
|
|
# ]
|
|
|
|
# Skip DNS rebinding protection for the default health check endpoint.
|
|
|
|
# config.host_authorization = { exclude: ->(request) { request.path == "/up" } }
|
2016-02-20 22:53:20 +01:00
|
|
|
end
|