diff options
author | Kelly Rauchenberger <fefferburbia@gmail.com> | 2017-09-16 18:46:55 -0400 |
---|---|---|
committer | Kelly Rauchenberger <fefferburbia@gmail.com> | 2017-09-16 18:46:55 -0400 |
commit | 5e62e771bf14f58dd1622d2e3631309caa201349 (patch) | |
tree | 76143baae833a4cfe0e05cefb18b5a31d15b74e9 /test/dummy/config/secrets.yml | |
download | pokeviewer-5e62e771bf14f58dd1622d2e3631309caa201349.tar.gz pokeviewer-5e62e771bf14f58dd1622d2e3631309caa201349.tar.bz2 pokeviewer-5e62e771bf14f58dd1622d2e3631309caa201349.zip |
Initial commit
Diffstat (limited to 'test/dummy/config/secrets.yml')
-rw-r--r-- | test/dummy/config/secrets.yml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/test/dummy/config/secrets.yml b/test/dummy/config/secrets.yml new file mode 100644 index 0000000..0a556f8 --- /dev/null +++ b/test/dummy/config/secrets.yml | |||
@@ -0,0 +1,32 @@ | |||
1 | # Be sure to restart your server when you modify this file. | ||
2 | |||
3 | # Your secret key is used for verifying the integrity of signed cookies. | ||
4 | # If you change this key, all old signed cookies will become invalid! | ||
5 | |||
6 | # Make sure the secret is at least 30 characters and all random, | ||
7 | # no regular words or you'll be exposed to dictionary attacks. | ||
8 | # You can use `rails secret` to generate a secure secret key. | ||
9 | |||
10 | # Make sure the secrets in this file are kept private | ||
11 | # if you're sharing your code publicly. | ||
12 | |||
13 | # Shared secrets are available across all environments. | ||
14 | |||
15 | # shared: | ||
16 | # api_key: a1B2c3D4e5F6 | ||
17 | |||
18 | # Environmental secrets are only available for that specific environment. | ||
19 | |||
20 | development: | ||
21 | secret_key_base: d94a7920fc6bda3f336cd79bd15d3d75aa6ebab77fc6f48649ffda7b42d7869a73bc0f1f11cb6f4a5db138a9c162602d31e99cc90fb7658aaf38c495ff44861f | ||
22 | |||
23 | test: | ||
24 | secret_key_base: 0ac56d59b80aab985c4e789a8c4c293c585ad31a5abe62acd4eda31e4f87211b1f86652e75a637485d052932b01a1b502ac0620052b0a68bbf9c01e85b721793 | ||
25 | |||
26 | # Do not keep production secrets in the unencrypted secrets file. | ||
27 | # Instead, either read values from the environment. | ||
28 | # Or, use `bin/rails secrets:setup` to configure encrypted secrets | ||
29 | # and move the `production:` environment over there. | ||
30 | |||
31 | production: | ||
32 | secret_key_base: <%= ENV["SECRET_KEY_BASE"] %> | ||