import Config

# config/runtime.exs is executed for all environments, including
# during releases. It is executed after compilation and before the
# system starts, so it is typically used to load production configuration
# and secrets from environment variables or elsewhere. Do not define
# any compile-time configuration in here, as it won't be applied.
# The block below contains prod specific runtime configuration.

# ## Using releases
#
# If you use `mix release`, you need to explicitly enable the server
# by passing the PHX_SERVER=true when you start it:
#
#     PHX_SERVER=true bin/bright start
#
# Alternatively, you can use `mix phx.gen.release` to generate a `bin/server`
# script that automatically sets the env var above.
if System.get_env("PHX_SERVER") do
  config :bright, BrightWeb.Endpoint, server: true
end

config :bright,
  aws_bucket: System.get_env("AWS_BUCKET"),
  aws_host: System.get_env("AWS_HOST"),
  aws_access_key_id: System.get_env("AWS_ACCESS_KEY_ID"),
  aws_secret_access_key: System.get_env("AWS_SECRET_ACCESS_KEY"),
  aws_region: System.get_env("AWS_REGION"),
  public_s3_endpoint: System.get_env("PUBLIC_S3_ENDPOINT"),
  site_url: System.get_env("SITE_URL"),
  cache_dir: System.get_env("CACHE_DIR"),
  vultr_ai_api_key: System.get_env("VULTR_AI_API_KEY")

config :bright, :torrent,
  tracker_url: System.get_env("TRACKER_URL"),
  tracker_helper_accesslist_url: System.get_env("TRACKER_HELPER_ACCESSLIST_URL"),
  tracker_helper_username: System.get_env("TRACKER_HELPER_USERNAME"),
  tracker_helper_password: System.get_env("TRACKER_HELPER_PASSWORD")

config :bright, :buckets, media: System.get_env("AWS_BUCKET")

# @see https://elixirforum.com/t/backblaze-and-ex-aws-ex-aws-s3-2-4-3-presign-url-issue/56805
config :ex_aws,
  access_key_id: {:system, "AWS_ACCESS_KEY_ID"},
  secret_access_key: {:system, "AWS_SECRET_ACCESS_KEY"},
  s3: [
    host: System.get_env("AWS_HOST"),
    bucket: System.get_env("AWS_BUCKET")
  ]

if config_env() == :prod do
  db_host = System.fetch_env!("DB_HOST")
  db_user = System.fetch_env!("DB_USER")
  db_pass = System.fetch_env!("DB_PASS")
  db_port = System.fetch_env!("DB_PORT")
  db_name = System.fetch_env!("DB_NAME")

  maybe_ipv6 = if System.get_env("ECTO_IPV6") in ~w(true 1), do: [:inet6], else: []

  config :bright, Bright.Repo,
    # ssl: true,
    # url: database_url,

    database: db_name,
    hostname: db_host,
    username: db_user,
    port: db_port,
    password: db_pass,
    pool_size: String.to_integer(System.get_env("POOL_SIZE") || "10"),
    socket_options: maybe_ipv6

  # The secret key base is used to sign/encrypt cookies and other secrets.
  # A default value is used in config/dev.exs and config/test.exs but you
  # want to use a different value for prod and you most likely don't want
  # to check this value into version control, so we use an environment
  # variable instead.
  secret_key_base =
    System.get_env("SECRET_KEY_BASE") ||
      raise """
      environment variable SECRET_KEY_BASE is missing.
      You can generate one by calling: mix phx.gen.secret
      """

  host = System.get_env("PHX_HOST") || "example.com"
  port = String.to_integer(System.get_env("PORT") || "4000")

  config :bright, :dns_cluster_query, System.get_env("DNS_CLUSTER_QUERY")

  config :bright, BrightWeb.Endpoint,
    url: [host: host, port: 443, scheme: "https"],
    http: [
      # Enable IPv6 and bind on all interfaces.
      # Set it to  {0, 0, 0, 0, 0, 0, 0, 1} for local network only access.
      # See the documentation on https://hexdocs.pm/bandit/Bandit.html#t:options/0
      # for details about using IPv6 vs IPv4 and loopback vs public addresses.
      ip: {0, 0, 0, 0, 0, 0, 0, 0},
      port: port
    ],
    secret_key_base: secret_key_base

  # We need to stop the program from running if OAuth client IDs and client secrets are not present in env.
  # We also do this in config.exs, but we wait to raise until here otherwise mix wouldn't be able to run ecto migrations
  System.get_env("PATREON_CLIENT_ID") ||
    raise("environment variable PATREON_CLIENT_ID is missing.")

  System.get_env("PATREON_CLIENT_SECRET") ||
    raise("environment variable PATREON_CLIENT_SECRET is missing.")

  System.get_env("PATREON_REDIRECT_URI") ||
    raise("environment variable PATREON_REDIRECT_URI is missing.")

  config :ueberauth, Ueberauth.Strategy.Patreon.OAuth,
    client_id: System.get_env("PATREON_CLIENT_ID"),
    client_secret: System.get_env("PATREON_CLIENT_SECRET"),
    redirect_uri: System.get_env("PATREON_REDIRECT_URI")

  # config :ueberauth, Ueberauth.Strategy.Github.OAuth,
  #   client_id: {:system, "GITHUB_CLIENT_ID"},
  #   client_secret: {:system, "GITHUB_CLIENT_SECRET"}

  # ## SSL Support
  #
  # To get SSL working, you will need to add the `https` key
  # to your endpoint configuration:
  #
  #     config :bright, BrightWeb.Endpoint,
  #       https: [
  #         ...,
  #         port: 443,
  #         cipher_suite: :strong,
  #         keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
  #         certfile: System.get_env("SOME_APP_SSL_CERT_PATH")
  #       ]
  #
  # The `cipher_suite` is set to `:strong` to support only the
  # latest and more secure SSL ciphers. This means old browsers
  # and clients may not be supported. You can set it to
  # `:compatible` for wider support.
  #
  # `:keyfile` and `:certfile` expect an absolute path to the key
  # and cert in disk or a relative path inside priv, for example
  # "priv/ssl/server.key". For all supported SSL configuration
  # options, see https://hexdocs.pm/plug/Plug.SSL.html#configure/1
  #
  # We also recommend setting `force_ssl` in your config/prod.exs,
  # ensuring no data is ever sent via http, always redirecting to https:
  #
  #     config :bright, BrightWeb.Endpoint,
  #       force_ssl: [hsts: true]
  #
  # Check `Plug.SSL` for all available options in `force_ssl`.

  # ## Configuring the mailer
  #
  # In production you need to configure the mailer to use a different adapter.
  # Also, you may need to configure the Swoosh API client of your choice if you
  # are not using SMTP. Here is an example of the configuration:
  #
  #     config :bright, Bright.Mailer,
  #       adapter: Swoosh.Adapters.Mailgun,
  #       api_key: System.get_env("MAILGUN_API_KEY"),
  #       domain: System.get_env("MAILGUN_DOMAIN")
  #
  # For this example you need include a HTTP client required by Swoosh API client.
  # Swoosh supports Hackney and Finch out of the box:
  #
  #     config :swoosh, :api_client, Swoosh.ApiClient.Hackney
  #
  # See https://hexdocs.pm/swoosh/Swoosh.html#module-installation for details.
end