Commit a4132de4 authored by Mario Manno's avatar Mario Manno Committed by Mario Manno

use secrets.yml instead

parent 92cdf300
......@@ -2,7 +2,6 @@
.ruby-version
config/database.yml
config/settings.yml
config/initializers/secret_token.rb
db/*.sqlite3
log/*.log
tmp/*
......
......@@ -4,7 +4,6 @@ rvm:
- 2.2.2
bundler_args: --without mysql postgresql
before_install:
- cp config/initializers/secret_token.rb.example config/initializers/secret_token.rb
- cp config/database.yml.template config/database.yml
- cp config/settings.yml.template config/settings.yml
script:
......
......@@ -86,10 +86,9 @@ with MySQL and SQLite3 (for development).
rake assets:precompile
10) Generate secret token and add the generated token into `config/initializers/secret_token.rb`
10) Generate secret token and export it for production servers
rake secret
cp config/initializers/secret_token.rb.example config/initializers/secret_token.rb
export SECRET_KEY_BASE=`rake secret`
11) Start the server
......
# Be sure to restart your server when you modify this file.
# Your secret key for verifying the integrity of signed cookies.
# If you change this key, all old signed cookies will become invalid!
# Make sure the secret is at least 30 characters and all random,
# no regular words or you'll be exposed to dictionary attacks.
# You can generate one with "rake secret"
Frab::Application.config.secret_token = 'iforgottochangetheexampletokenandnowvisitorscanexecutecodeonmyserver'
# Be sure to restart your server when you modify this file.
# Your secret key is used for verifying the integrity of signed cookies.
# If you change this key, all old signed cookies will become invalid!
# Make sure the secret is at least 30 characters and all random,
# no regular words or you'll be exposed to dictionary attacks.
# You can use `rake secret` to generate a secure secret key.
# Make sure the secrets in this file are kept private
# if you're sharing your code publicly.
development:
secret_key_base: 1def3d3e84249c724db0a3c20534d17bd8622e0fe35a7c859e3742f50e76175865ea69e4c0c8aec4832795e73bc24d1f9d67343211ac544cfb7803df05198551
test:
secret_key_base: 2def3d3e84249c724db0a3c20534d17bd8622e0fe35a7c859e3742f50e76175865ea69e4c0c8aec4832795e73bc24d1f9d67343211ac544cfb7803df05198551
# Do not keep production secrets in the repository,
# instead read values from the environment.
production:
secret_key_base: <%= ENV['SECRET_KEY_BASE'] %>
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment