spec/dummy/config/secrets.yml in cavy-0.1.0.beta1 vs spec/dummy/config/secrets.yml in cavy-0.1.0.beta2
- old
+ new
@@ -8,15 +8,25 @@
# You can use `rails secret` to generate a secure secret key.
# Make sure the secrets in this file are kept private
# if you're sharing your code publicly.
+# Shared secrets are available across all environments.
+
+# shared:
+# api_key: a1B2c3D4e5F6
+
+# Environmental secrets are only available for that specific environment.
+
development:
secret_key_base: cf978639855178417a304d005472f43f5986453df67192a0ce776447e14e7f3612a5044b97a4f54e65c3e3de12e86ca660cca76e6bb3440c4a3e0220a03b6561
test:
secret_key_base: 76add722c90a61b669ccfaa2b3c11639692041f0dee5a94049e9d2223a5f62bd5465ca1196bafac9041501555dcc7bcbe4bda82c478dc63f5f2cb57c9a54f521
-# Do not keep production secrets in the repository,
-# instead read values from the environment.
+# Do not keep production secrets in the unencrypted secrets file.
+# Instead, either read values from the environment.
+# Or, use `bin/rails secrets:setup` to configure encrypted secrets
+# and move the `production:` environment over there.
+
production:
- secret_key_base: cf978639855178417a304d005472f43f5986453df67192a0ce776447e14e7f3612a5044b97a4f54e65c3e3de12e86ca660cca76e6bb3440c4a3e0220a03b6561
+ secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>