about summary refs log tree commit diff stats
path: root/test/dummy/config/secrets.yml
diff options
context:
space:
mode:
authorStar Rauchenberger <fefferburbia@gmail.com>2024-12-07 11:49:49 -0500
committerStar Rauchenberger <fefferburbia@gmail.com>2024-12-07 11:49:49 -0500
commit56f5841d4b9c12296cdfcaeff174b2627d59afc8 (patch)
tree4f7da4ebbe5ee15a1594b26466ed78e2cf10de35 /test/dummy/config/secrets.yml
parentc1b0443ba2aebdbd39291ddab0c189f3f4831320 (diff)
downloadpokeviewer-56f5841d4b9c12296cdfcaeff174b2627d59afc8.tar.gz
pokeviewer-56f5841d4b9c12296cdfcaeff174b2627d59afc8.tar.bz2
pokeviewer-56f5841d4b9c12296cdfcaeff174b2627d59afc8.zip
Migrate to full rails app
Diffstat (limited to 'test/dummy/config/secrets.yml')
-rw-r--r--test/dummy/config/secrets.yml32
1 files changed, 0 insertions, 32 deletions
diff --git a/test/dummy/config/secrets.yml b/test/dummy/config/secrets.yml deleted file mode 100644 index 0a556f8..0000000 --- a/test/dummy/config/secrets.yml +++ /dev/null
@@ -1,32 +0,0 @@
1# Be sure to restart your server when you modify this file.
2
3# Your secret key is used for verifying the integrity of signed cookies.
4# If you change this key, all old signed cookies will become invalid!
5
6# Make sure the secret is at least 30 characters and all random,
7# no regular words or you'll be exposed to dictionary attacks.
8# You can use `rails secret` to generate a secure secret key.
9
10# Make sure the secrets in this file are kept private
11# if you're sharing your code publicly.
12
13# Shared secrets are available across all environments.
14
15# shared:
16# api_key: a1B2c3D4e5F6
17
18# Environmental secrets are only available for that specific environment.
19
20development:
21 secret_key_base: d94a7920fc6bda3f336cd79bd15d3d75aa6ebab77fc6f48649ffda7b42d7869a73bc0f1f11cb6f4a5db138a9c162602d31e99cc90fb7658aaf38c495ff44861f
22
23test:
24 secret_key_base: 0ac56d59b80aab985c4e789a8c4c293c585ad31a5abe62acd4eda31e4f87211b1f86652e75a637485d052932b01a1b502ac0620052b0a68bbf9c01e85b721793
25
26# Do not keep production secrets in the unencrypted secrets file.
27# Instead, either read values from the environment.
28# Or, use `bin/rails secrets:setup` to configure encrypted secrets
29# and move the `production:` environment over there.
30
31production:
32 secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>