about summary refs log tree commit diff stats
path: root/config/secrets.yml
diff options
context:
space:
mode:
authorStar Rauchenberger <fefferburbia@gmail.com>2024-12-07 13:31:31 -0500
committerStar Rauchenberger <fefferburbia@gmail.com>2024-12-07 13:31:31 -0500
commitb5afc0cf9db8d50d1d95fc2c2fe8b451f8825b46 (patch)
tree95ea3dfc7d0aa75be20f4e6f7cfe099b96805c21 /config/secrets.yml
parenteb41f85dd46b4d224aa3f3bc2c05d577ac50625f (diff)
downloadthoughts-b5afc0cf9db8d50d1d95fc2c2fe8b451f8825b46.tar.gz
thoughts-b5afc0cf9db8d50d1d95fc2c2fe8b451f8825b46.tar.bz2
thoughts-b5afc0cf9db8d50d1d95fc2c2fe8b451f8825b46.zip
Moved secret base, Akismet, Sendgrid, and database keys into credentials
Diffstat (limited to 'config/secrets.yml')
-rw-r--r--config/secrets.yml32
1 files changed, 0 insertions, 32 deletions
diff --git a/config/secrets.yml b/config/secrets.yml deleted file mode 100644 index 31946ec..0000000 --- a/config/secrets.yml +++ /dev/null
@@ -1,32 +0,0 @@
1# Be sure to restart your server when you modify this file.
2
3# Your secret key is used for verifying the integrity of signed cookies.
4# If you change this key, all old signed cookies will become invalid!
5
6# Make sure the secret is at least 30 characters and all random,
7# no regular words or you'll be exposed to dictionary attacks.
8# You can use `rails secret` to generate a secure secret key.
9
10# Make sure the secrets in this file are kept private
11# if you're sharing your code publicly.
12
13# Shared secrets are available across all environments.
14
15# shared:
16# api_key: a1B2c3D4e5F6
17
18# Environmental secrets are only available for that specific environment.
19
20development:
21 secret_key_base: d56c163402b7f74e65934e2a5d5a0990a8120dc88c39c5ca00c143cbc1551f0d21e811cbd246c282ffc58d46286f5ae7d3231696c21772b252f137c24de0aa3f
22
23test:
24 secret_key_base: 66e64fc722045f0e636e7658997477d4e265d14e5dfef59f045e3512019b38a885320274116edf354d390a6019555848a89d8a3e01a6091df83032120edff6ac
25
26# Do not keep production secrets in the unencrypted secrets file.
27# Instead, either read values from the environment.
28# Or, use `bin/rails secrets:setup` to configure encrypted secrets
29# and move the `production:` environment over there.
30
31production:
32 secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>