From 5ba1028d0c64e934fa0c29890ad35b44125a7f83 Mon Sep 17 00:00:00 2001 From: Cory Lown Date: Fri, 16 Aug 2024 14:20:30 -0400 Subject: [PATCH] Remove config/secrets.yml --- config/secrets.yml | 32 -------------------------------- 1 file changed, 32 deletions(-) delete mode 100644 config/secrets.yml diff --git a/config/secrets.yml b/config/secrets.yml deleted file mode 100644 index 7ebd94da..00000000 --- a/config/secrets.yml +++ /dev/null @@ -1,32 +0,0 @@ -# Be sure to restart your server when you modify this file. - -# Your secret key is used for verifying the integrity of signed cookies. -# If you change this key, all old signed cookies will become invalid! - -# Make sure the secret is at least 30 characters and all random, -# no regular words or you'll be exposed to dictionary attacks. -# You can use `rails secret` to generate a secure secret key. - -# Make sure the secrets in this file are kept private -# if you're sharing your code publicly. - -# Shared secrets are available across all environments. - -# shared: -# api_key: a1B2c3D4e5F6 - -# Environmental secrets are only available for that specific environment. - -development: - secret_key_base: eabe8f1f0f2a18d3a68b62254bf30df263f058346a46349d2da643dbb77bae523c192dbc0cf0b04a493232797b8c9878f215b7b8038ea3c396f261b13ccfee2c - -test: - secret_key_base: defeb8aa04f94d0cdc2bbc195754e3747a66f3f192df191c14843b01dd601c87136058832cc9fe6d74fc4a599325cd726d73d238808bc31b92dc94d842832c4f - -# Do not keep production secrets in the unencrypted secrets file. -# Instead, either read values from the environment. -# Or, use `bin/rails secrets:setup` to configure encrypted secrets -# and move the `production:` environment over there. - -production: - secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>