tubbsfireinfo.com/FireResponse/config/secrets.yml

33 lines
1.2 KiB
YAML

# Be sure to restart your server when you modify this file.
# Your secret key is used for verifying the integrity of signed cookies.
# If you change this key, all old signed cookies will become invalid!
# Make sure the secret is at least 30 characters and all random,
# no regular words or you'll be exposed to dictionary attacks.
# You can use `rails secret` to generate a secure secret key.
# Make sure the secrets in this file are kept private
# if you're sharing your code publicly.
# Shared secrets are available across all environments.
# shared:
# api_key: a1B2c3D4e5F6
# Environmental secrets are only available for that specific environment.
development:
secret_key_base: 66827034c4ee42c7a008768a8a99eddc7a437671e8d36062c62cbdcc75e6d1a00ec9076deb6fdd8df7e30bf9a2aefe13af9eedb2e0f79fed1bb739002ecfc2dc
test:
secret_key_base: f2fc4bcd68a2a328c4201cc1960744f3968975619bbe076b0986ce6331cedc1c74953fd4da535f130ae16a7cb212177ac665ea237b0cca89ea37749ad6818c55
# Do not keep production secrets in the unencrypted secrets file.
# Instead, either read values from the environment.
# Or, use `bin/rails secrets:setup` to configure encrypted secrets
# and move the `production:` environment over there.
production:
secret_key_base: <%= ENV["SECRET_KEY_BASE"] %>