spec/dummy/config/secrets.yml in cavy-0.1.0.beta1 vs spec/dummy/config/secrets.yml in cavy-0.1.0.beta2

- old
+ new

@@ -8,15 +8,25 @@ # You can use `rails secret` to generate a secure secret key. # Make sure the secrets in this file are kept private # if you're sharing your code publicly. +# Shared secrets are available across all environments. + +# shared: +# api_key: a1B2c3D4e5F6 + +# Environmental secrets are only available for that specific environment. + development: secret_key_base: cf978639855178417a304d005472f43f5986453df67192a0ce776447e14e7f3612a5044b97a4f54e65c3e3de12e86ca660cca76e6bb3440c4a3e0220a03b6561 test: secret_key_base: 76add722c90a61b669ccfaa2b3c11639692041f0dee5a94049e9d2223a5f62bd5465ca1196bafac9041501555dcc7bcbe4bda82c478dc63f5f2cb57c9a54f521 -# Do not keep production secrets in the repository, -# instead read values from the environment. +# Do not keep production secrets in the unencrypted secrets file. +# Instead, either read values from the environment. +# Or, use `bin/rails secrets:setup` to configure encrypted secrets +# and move the `production:` environment over there. + production: - secret_key_base: cf978639855178417a304d005472f43f5986453df67192a0ce776447e14e7f3612a5044b97a4f54e65c3e3de12e86ca660cca76e6bb3440c4a3e0220a03b6561 + secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>