From 05ad4fbf59fb4d423d45ddfc535875c7af3e5575 Mon Sep 17 00:00:00 2001 From: Justin Coyne Date: Fri, 16 Aug 2024 14:40:21 -0500 Subject: [PATCH] Remove config/secrets.yml We now get this from an env variable --- config/deploy.rb | 2 +- config/secrets.yml | 32 -------------------------------- 2 files changed, 1 insertion(+), 33 deletions(-) delete mode 100644 config/secrets.yml diff --git a/config/deploy.rb b/config/deploy.rb index b5246383..b14c6b03 100644 --- a/config/deploy.rb +++ b/config/deploy.rb @@ -24,7 +24,7 @@ # set :pty, true # Default value for :linked_files is [] -set :linked_files, %w[config/database.yml config/secrets.yml config/honeybadger.yml] +set :linked_files, %w[config/database.yml config/honeybadger.yml] # Default value for linked_dirs is [] set :linked_dirs, %w[config/settings log storage tmp/pids tmp/cache tmp/sockets tmp/uploads vendor/bundle public/system] diff --git a/config/secrets.yml b/config/secrets.yml deleted file mode 100644 index 6d25a09c..00000000 --- a/config/secrets.yml +++ /dev/null @@ -1,32 +0,0 @@ -# Be sure to restart your server when you modify this file. - -# Your secret key is used for verifying the integrity of signed cookies. -# If you change this key, all old signed cookies will become invalid! - -# Make sure the secret is at least 30 characters and all random, -# no regular words or you'll be exposed to dictionary attacks. -# You can use `rails secret` to generate a secure secret key. - -# Make sure the secrets in this file are kept private -# if you're sharing your code publicly. - -# Shared secrets are available across all environments. - -# shared: -# api_key: a1B2c3D4e5F6 - -# Environmental secrets are only available for that specific environment. - -development: - secret_key_base: 9f3599deacd1245333fdbbf435786a5dc4e3007ad8a214e86d368a0c7624132da3ab44d28aad95f4d78deac923f4569f08ed4e833749c2ab380182046df8a586 - -test: - secret_key_base: 0fcc4f9f7cd140d5b81d21981c6d4f8fc1d8b819a9fba8338dc94e8480318f97dd38376d88df5bfc20059997032f032694ae03f70242df166581cda9e0653cb5 - -# Do not keep production secrets in the unencrypted secrets file. -# Instead, either read values from the environment. -# Or, use `bin/rails secrets:setup` to configure encrypted secrets -# and move the `production:` environment over there. - -production: - secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>