* Document AUTHORIZED_FETCH mode and WHITELIST_MODE * Replace extended description with a link to the online docs
		
			
				
	
	
		
			262 lines
		
	
	
	
		
			9.4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			262 lines
		
	
	
	
		
			9.4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| # Service dependencies
 | ||
| # You may set REDIS_URL instead for more advanced options
 | ||
| # You may also set REDIS_NAMESPACE to share Redis between multiple Mastodon servers
 | ||
| REDIS_HOST=redis
 | ||
| REDIS_PORT=6379
 | ||
| # You may set DATABASE_URL instead for more advanced options
 | ||
| DB_HOST=db
 | ||
| DB_USER=postgres
 | ||
| DB_NAME=postgres
 | ||
| DB_PASS=
 | ||
| DB_PORT=5432
 | ||
| # Optional ElasticSearch configuration
 | ||
| # You may also set ES_PREFIX to share the same cluster between multiple Mastodon servers (falls back to REDIS_NAMESPACE if not set)
 | ||
| # ES_ENABLED=true
 | ||
| # ES_HOST=es
 | ||
| # ES_PORT=9200
 | ||
| 
 | ||
| # Federation
 | ||
| # Note: Changing LOCAL_DOMAIN at a later time will cause unwanted side effects, including breaking all existing federation.
 | ||
| # LOCAL_DOMAIN should *NOT* contain the protocol part of the domain e.g https://example.com.
 | ||
| LOCAL_DOMAIN=example.com
 | ||
| 
 | ||
| # Changing LOCAL_HTTPS in production is no longer supported. (Mastodon will always serve https:// links)
 | ||
| 
 | ||
| # Use this only if you need to run mastodon on a different domain than the one used for federation.
 | ||
| # You can read more about this option on https://github.com/tootsuite/documentation/blob/master/Running-Mastodon/Serving_a_different_domain.md
 | ||
| # DO *NOT* USE THIS UNLESS YOU KNOW *EXACTLY* WHAT YOU ARE DOING.
 | ||
| # WEB_DOMAIN=mastodon.example.com
 | ||
| 
 | ||
| # Use this if you want to have several aliases handler@example1.com
 | ||
| # handler@example2.com etc. for the same user. LOCAL_DOMAIN should not
 | ||
| # be added. Comma separated values
 | ||
| # ALTERNATE_DOMAINS=example1.com,example2.com
 | ||
| 
 | ||
| # Application secrets
 | ||
| # Generate each with the `RAILS_ENV=production bundle exec rake secret` task (`docker-compose run --rm web rake secret` if you use docker compose)
 | ||
| SECRET_KEY_BASE=
 | ||
| OTP_SECRET=
 | ||
| 
 | ||
| # VAPID keys (used for push notifications
 | ||
| # You can generate the keys using the following command (first is the private key, second is the public one)
 | ||
| # You should only generate this once per instance. If you later decide to change it, all push subscription will
 | ||
| # be invalidated, requiring the users to access the website again to resubscribe.
 | ||
| #
 | ||
| # Generate with `RAILS_ENV=production bundle exec rake mastodon:webpush:generate_vapid_key` task (`docker-compose run --rm web rake mastodon:webpush:generate_vapid_key` if you use docker compose)
 | ||
| #
 | ||
| # For more information visit https://rossta.net/blog/using-the-web-push-api-with-vapid.html
 | ||
| VAPID_PRIVATE_KEY=
 | ||
| VAPID_PUBLIC_KEY=
 | ||
| 
 | ||
| # Registrations
 | ||
| # Single user mode will disable registrations and redirect frontpage to the first profile
 | ||
| # SINGLE_USER_MODE=true
 | ||
| # Prevent registrations with following e-mail domains
 | ||
| # EMAIL_DOMAIN_BLACKLIST=example1.com|example2.de|etc
 | ||
| # Only allow registrations with the following e-mail domains
 | ||
| # EMAIL_DOMAIN_WHITELIST=example1.com|example2.de|etc
 | ||
| 
 | ||
| # Optionally change default language
 | ||
| # DEFAULT_LOCALE=de
 | ||
| 
 | ||
| # E-mail configuration
 | ||
| # Note: Mailgun and SparkPost (https://sparkpo.st/smtp) each have good free tiers
 | ||
| # If you want to use an SMTP server without authentication (e.g local Postfix relay)
 | ||
| # then set SMTP_AUTH_METHOD and SMTP_OPENSSL_VERIFY_MODE to 'none' and
 | ||
| # *comment* SMTP_LOGIN and SMTP_PASSWORD (leaving them blank is not enough).
 | ||
| SMTP_SERVER=smtp.mailgun.org
 | ||
| SMTP_PORT=587
 | ||
| SMTP_LOGIN=
 | ||
| SMTP_PASSWORD=
 | ||
| SMTP_FROM_ADDRESS=notifications@example.com
 | ||
| #SMTP_REPLY_TO=
 | ||
| #SMTP_DOMAIN= # defaults to LOCAL_DOMAIN
 | ||
| #SMTP_DELIVERY_METHOD=smtp # delivery method can also be sendmail
 | ||
| #SMTP_AUTH_METHOD=plain
 | ||
| #SMTP_CA_FILE=/etc/ssl/certs/ca-certificates.crt
 | ||
| #SMTP_OPENSSL_VERIFY_MODE=peer
 | ||
| #SMTP_ENABLE_STARTTLS_AUTO=true
 | ||
| #SMTP_TLS=true
 | ||
| 
 | ||
| # Optional user upload path and URL (images, avatars). Default is :rails_root/public/system. If you set this variable, you are responsible for making your HTTP server (eg. nginx) serve these files.
 | ||
| # PAPERCLIP_ROOT_PATH=/var/lib/mastodon/public-system
 | ||
| # PAPERCLIP_ROOT_URL=/system
 | ||
| 
 | ||
| # Optional asset host for multi-server setups
 | ||
| # The asset host must allow cross origin request from WEB_DOMAIN or LOCAL_DOMAIN
 | ||
| # if WEB_DOMAIN is not set. For example, the server may have the
 | ||
| # following header field:
 | ||
| # Access-Control-Allow-Origin: https://example.com/
 | ||
| # CDN_HOST=https://assets.example.com
 | ||
| 
 | ||
| # S3 (optional)
 | ||
| # The attachment host must allow cross origin request from WEB_DOMAIN or
 | ||
| # LOCAL_DOMAIN if WEB_DOMAIN is not set. For example, the server may have the
 | ||
| # following header field:
 | ||
| # Access-Control-Allow-Origin: https://192.168.1.123:9000/
 | ||
| # S3_ENABLED=true
 | ||
| # S3_BUCKET=
 | ||
| # AWS_ACCESS_KEY_ID=
 | ||
| # AWS_SECRET_ACCESS_KEY=
 | ||
| # S3_REGION=
 | ||
| # S3_PROTOCOL=http
 | ||
| # S3_HOSTNAME=192.168.1.123:9000
 | ||
| 
 | ||
| # S3 (Minio Config (optional) Please check Minio instance for details)
 | ||
| # The attachment host must allow cross origin request - see the description
 | ||
| # above.
 | ||
| # S3_ENABLED=true
 | ||
| # S3_BUCKET=
 | ||
| # AWS_ACCESS_KEY_ID=
 | ||
| # AWS_SECRET_ACCESS_KEY=
 | ||
| # S3_REGION=
 | ||
| # S3_PROTOCOL=https
 | ||
| # S3_HOSTNAME=
 | ||
| # S3_ENDPOINT=
 | ||
| # S3_SIGNATURE_VERSION=
 | ||
| 
 | ||
| # Google Cloud Storage (optional)
 | ||
| # Use S3 compatible API. Since GCS does not support Multipart Upload,
 | ||
| # increase the value of S3_MULTIPART_THRESHOLD to disable Multipart Upload.
 | ||
| # The attachment host must allow cross origin request - see the description
 | ||
| # above.
 | ||
| # S3_ENABLED=true
 | ||
| # AWS_ACCESS_KEY_ID=
 | ||
| # AWS_SECRET_ACCESS_KEY=
 | ||
| # S3_REGION=
 | ||
| # S3_PROTOCOL=https
 | ||
| # S3_HOSTNAME=storage.googleapis.com
 | ||
| # S3_ENDPOINT=https://storage.googleapis.com
 | ||
| # S3_MULTIPART_THRESHOLD=52428801 # 50.megabytes
 | ||
| 
 | ||
| # Swift (optional)
 | ||
| # The attachment host must allow cross origin request - see the description
 | ||
| # above.
 | ||
| # SWIFT_ENABLED=true
 | ||
| # SWIFT_USERNAME=
 | ||
| # For Keystone V3, the value for SWIFT_TENANT should be the project name
 | ||
| # SWIFT_TENANT=
 | ||
| # SWIFT_PASSWORD=
 | ||
| # Some OpenStack V3 providers require PROJECT_ID (optional)
 | ||
| # SWIFT_PROJECT_ID=
 | ||
| # Keystone V2 and V3 URLs are supported. Use a V3 URL if possible to avoid
 | ||
| # issues with token rate-limiting during high load.
 | ||
| # SWIFT_AUTH_URL=
 | ||
| # SWIFT_CONTAINER=
 | ||
| # SWIFT_OBJECT_URL=
 | ||
| # SWIFT_REGION=
 | ||
| # Defaults to 'default'
 | ||
| # SWIFT_DOMAIN_NAME=
 | ||
| # Defaults to 60 seconds. Set to 0 to disable
 | ||
| # SWIFT_CACHE_TTL=
 | ||
| 
 | ||
| # Optional alias for S3 (e.g. to serve files on a custom domain, possibly using Cloudfront or Cloudflare)
 | ||
| # S3_ALIAS_HOST=
 | ||
| 
 | ||
| # Streaming API integration
 | ||
| # STREAMING_API_BASE_URL=
 | ||
| 
 | ||
| # Advanced settings
 | ||
| # If you need to use pgBouncer, you need to disable prepared statements:
 | ||
| # PREPARED_STATEMENTS=false
 | ||
| 
 | ||
| # Cluster number setting for streaming API server.
 | ||
| # If you comment out following line, cluster number will be `numOfCpuCores - 1`.
 | ||
| STREAMING_CLUSTER_NUM=1
 | ||
| 
 | ||
| # Docker mastodon user
 | ||
| # If you use Docker, you may want to assign UID/GID manually.
 | ||
| # UID=1000
 | ||
| # GID=1000
 | ||
| 
 | ||
| # LDAP authentication (optional)
 | ||
| # LDAP_ENABLED=true
 | ||
| # LDAP_HOST=localhost
 | ||
| # LDAP_PORT=389
 | ||
| # LDAP_METHOD=simple_tls
 | ||
| # LDAP_BASE=
 | ||
| # LDAP_BIND_DN=
 | ||
| # LDAP_PASSWORD=
 | ||
| # LDAP_UID=cn
 | ||
| # LDAP_MAIL=mail
 | ||
| # LDAP_SEARCH_FILTER=(|(%{uid}=%{email})(%{mail}=%{email}))
 | ||
| # LDAP_UID_CONVERSION_ENABLED=true
 | ||
| # LDAP_UID_CONVERSION_SEARCH=., -
 | ||
| # LDAP_UID_CONVERSION_REPLACE=_
 | ||
| 
 | ||
| # PAM authentication (optional)
 | ||
| # PAM authentication uses for the email generation the "email" pam variable
 | ||
| # and optional as fallback PAM_DEFAULT_SUFFIX
 | ||
| # The pam environment variable "email" is provided by:
 | ||
| # https://github.com/devkral/pam_email_extractor
 | ||
| # PAM_ENABLED=true
 | ||
| # Fallback email domain for email address generation (LOCAL_DOMAIN by default)
 | ||
| # PAM_EMAIL_DOMAIN=example.com
 | ||
| # Name of the pam service (pam "auth" section is evaluated)
 | ||
| # PAM_DEFAULT_SERVICE=rpam
 | ||
| # Name of the pam service used for checking if an user can register (pam "account" section is evaluated) (nil (disabled) by default)
 | ||
| # PAM_CONTROLLED_SERVICE=rpam
 | ||
| 
 | ||
| # Global OAuth settings (optional) :
 | ||
| # If you have only one strategy, you may want to enable this
 | ||
| # OAUTH_REDIRECT_AT_SIGN_IN=true
 | ||
| 
 | ||
| # Optional CAS authentication (cf. omniauth-cas) :
 | ||
| # CAS_ENABLED=true
 | ||
| # CAS_URL=https://sso.myserver.com/
 | ||
| # CAS_HOST=sso.myserver.com/
 | ||
| # CAS_PORT=443
 | ||
| # CAS_SSL=true
 | ||
| # CAS_VALIDATE_URL=
 | ||
| # CAS_CALLBACK_URL=
 | ||
| # CAS_LOGOUT_URL=
 | ||
| # CAS_LOGIN_URL=
 | ||
| # CAS_UID_FIELD='user'
 | ||
| # CAS_CA_PATH=
 | ||
| # CAS_DISABLE_SSL_VERIFICATION=false
 | ||
| # CAS_UID_KEY='user'
 | ||
| # CAS_NAME_KEY='name'
 | ||
| # CAS_EMAIL_KEY='email'
 | ||
| # CAS_NICKNAME_KEY='nickname'
 | ||
| # CAS_FIRST_NAME_KEY='firstname'
 | ||
| # CAS_LAST_NAME_KEY='lastname'
 | ||
| # CAS_LOCATION_KEY='location'
 | ||
| # CAS_IMAGE_KEY='image'
 | ||
| # CAS_PHONE_KEY='phone'
 | ||
| 
 | ||
| # Optional SAML authentication (cf. omniauth-saml)
 | ||
| # SAML_ENABLED=true
 | ||
| # SAML_ACS_URL=http://localhost:3000/auth/auth/saml/callback
 | ||
| # SAML_ISSUER=https://example.com
 | ||
| # SAML_IDP_SSO_TARGET_URL=https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO
 | ||
| # SAML_IDP_CERT=
 | ||
| # SAML_IDP_CERT_FINGERPRINT=
 | ||
| # SAML_NAME_IDENTIFIER_FORMAT=
 | ||
| # SAML_CERT=
 | ||
| # SAML_PRIVATE_KEY=
 | ||
| # SAML_SECURITY_WANT_ASSERTION_SIGNED=true
 | ||
| # SAML_SECURITY_WANT_ASSERTION_ENCRYPTED=true
 | ||
| # SAML_SECURITY_ASSUME_EMAIL_IS_VERIFIED=true
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_UID="urn:oid:0.9.2342.19200300.100.1.1"
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_EMAIL="urn:oid:1.3.6.1.4.1.5923.1.1.1.6"
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_FULL_NAME="urn:oid:2.16.840.1.113730.3.1.241"
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_FIRST_NAME="urn:oid:2.5.4.42"
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_LAST_NAME="urn:oid:2.5.4.4"
 | ||
| # SAML_UID_ATTRIBUTE="urn:oid:0.9.2342.19200300.100.1.1"
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_VERIFIED=
 | ||
| # SAML_ATTRIBUTES_STATEMENTS_VERIFIED_EMAIL=
 | ||
| 
 | ||
| # Use HTTP proxy for outgoing request (optional)
 | ||
| # http_proxy=http://gateway.local:8118
 | ||
| # Access control for hidden service.
 | ||
| # ALLOW_ACCESS_TO_HIDDEN_SERVICE=true
 | ||
| 
 | ||
| # Authorized fetch mode (optional)
 | ||
| # Require remote servers to authentify when fetching toots, see
 | ||
| # https://docs.joinmastodon.org/admin/config/#authorized_fetch
 | ||
| # AUTHORIZED_FETCH=true
 | ||
| 
 | ||
| # Whitelist mode (optional)
 | ||
| # Only allow federation with whitelisted domains, see
 | ||
| # https://docs.joinmastodon.org/admin/config/#whitelist_mode
 | ||
| # WHITELIST_MODE=true
 |