spec/rails/rails-5.1.2/config/secrets.yml in approval-0.3.1 vs spec/rails/rails-5.1.2/config/secrets.yml in approval-0.3.2
- old
+ new
@@ -16,13 +16,13 @@
# api_key: a1B2c3D4e5F6
# Environmental secrets are only available for that specific environment.
development:
- secret_key_base: f24d1491c30c7f3fbd13d046410067bb3ee0d6bfbb79959a19f5c9f4004041c634501a3cb97470c3cc8e488d01dc547e443c864956bcfd0be855b969638378ad
+ secret_key_base: 451e3865bca49cc9ea8e461ec93f5998ecca5c20a5d6682a63c3937a2d114ae9f9a2a0035c47f0f4efb6da7149fa66595a205e25b981e307a1198b6cd04da2b2
test:
- secret_key_base: 76b5e6234566e55c46cbbfb78a4f939ccb852508695571da192fc832a436df48a618a4c0ab0d780f781a0dbd073d3e5373e52bd35701612badc0ae41eddf355d
+ secret_key_base: 3c968d38bab889b9896c300d184fc8b9da2f2b4d189d06f0d99fb8c00c69637a1c120d1614701eee71075eaedbb30206910dd9e2231fe050f41ce0066d33e7fc
# Do not keep production secrets in the unencrypted secrets file.
# Instead, either read values from the environment.
# Or, use `bin/rails secrets:setup` to configure encrypted secrets
# and move the `production:` environment over there.